A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.
Metrics
Affected Vendors & Products
References
History
Fri, 09 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 09 May 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received. |
Title | ring: Some AES functions may panic when overflow checking is enabled in ring | Ring: some aes functions may panic when overflow checking is enabled in ring |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift Redhat satellite Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/a:redhat:satellite:6 cpe:/a:redhat:trusted_artifact_signer:1 cpe:/a:redhat:trusted_profile_analyzer:1 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift Redhat satellite Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
References |
|
Fri, 09 May 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | ring: Some AES functions may panic when overflow checking is enabled in ring | |
Weaknesses | CWE-770 | |
References |
|
|
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-05-09T16:06:33.671Z
Updated: 2025-05-09T16:33:29.829Z
Reserved: 2025-05-08T12:49:25.624Z
Link: CVE-2025-4432

Updated: 2025-05-09T16:33:17.397Z

Status : Received
Published: 2025-05-09T16:15:25.467
Modified: 2025-05-09T16:15:25.467
Link: CVE-2025-4432
