Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Rust 1.93: Denial of Service via Malicious Network Packets
Summary
Rust 1.93 has a security update to prevent a denial of service attack through specially crafted network packets. This update also resolves a build issue that could prevent some programs from compiling. Update to the latest version of Rust to ensure you have the latest security patches and avoid potential build issues.
What to do
- Update rust1.93 to version 1.93.0-150300.7.6.1.
Affected software
| Ecosystem | Vendor | Product | Affected versions |
|---|---|---|---|
| SUSE:Linux Enterprise Module for Development Tools 15 SP7 | – | rust1.93 |
< 1.93.0-150300.7.6.1 Fix: upgrade to 1.93.0-150300.7.6.1
|
| openSUSE:Leap 15.6 | – | rust1.93 |
< 1.93.0-150300.7.6.1 Fix: upgrade to 1.93.0-150300.7.6.1
|
Original title
Security update for rust1.93
Original description
This update for rust1.93 fixes the following issues:
Security issue:
- CVE-2026-31812: denial of service via crafted QUIC initial packet (bsc#1259623).
Non security issue:
- Resolve missing gcc requirement that may affect some crate buildin (bsc#1253321).
Security issue:
- CVE-2026-31812: denial of service via crafted QUIC initial packet (bsc#1259623).
Non security issue:
- Resolve missing gcc requirement that may affect some crate buildin (bsc#1253321).
- https://www.suse.com/support/update/announcement/2026/suse-su-20261415-1/ Vendor Advisory
- https://bugzilla.suse.com/1253321 Third Party Advisory
- https://bugzilla.suse.com/1259623 Third Party Advisory
- https://www.suse.com/security/cve/CVE-2026-31812 URL
Published: 16 Apr 2026 · Updated: 17 Apr 2026 · First seen: 17 Apr 2026