We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.
Reserved 2025-05-08 | Published 2025-05-09 | Updated 2025-05-09 | Assigner redhatAllocation of Resources Without Limits or Throttling
2025-03-07: | Reported to Red Hat. |
2025-03-07: | Made public. |
access.redhat.com/security/cve/CVE-2025-4432
bugzilla.redhat.com/show_bug.cgi?id=2350655 (RHBZ#2350655)
github.com/briansmith/ring/blob/main/RELEASES.md
github.com/...ommit/ec2d3cf1d91f148c84e4806b4f0b3c98f6df3b38
github.com/briansmith/ring/pull/2447
rustsec.org/advisories/RUSTSEC-2025-0009.html
Support options