{"id":"CVE-2025-4432","details":"A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.","aliases":["GHSA-4p46-pwfr-66x6","GHSA-c86p-w88r-qvqr","GO-2025-3678","RUSTSEC-2025-0009"],"modified":"2026-04-10T05:29:36.492117Z","published":"2025-05-09T16:15:25.467Z","related":["CGA-9m7g-cwwp-hr9v","openSUSE-SU-2025:15135-1"],"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-4432"},{"type":"WEB","url":"https://github.com/briansmith/ring/blob/main/RELEASES.md#version-01712-2025-03-05"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2025-0009.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350655"},{"type":"FIX","url":"https://github.com/briansmith/ring/commit/ec2d3cf1d91f148c84e4806b4f0b3c98f6df3b38"},{"type":"FIX","url":"https://github.com/briansmith/ring/pull/2447"},{"type":"PACKAGE","url":"https://github.com/briansmith/ring"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/briansmith/ring","events":[{"introduced":"0"},{"fixed":"ec2d3cf1d91f148c84e4806b4f0b3c98f6df3b38"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-4432.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}