CVE-2025-4432
MEDIUMCrates.io Ring < 0.17.12 - Resource Allocation Without Limits
Title source: ruleDescription
A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.
References (7)
Core 7
Core References
Various Sources
https://github.com/briansmith/ring
Various Sources
https://rustsec.org/advisories/RUSTSEC-2025-0009.html
Vendor Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2025-4432
Issue Tracking issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2350655
Issue Tracking
https://github.com/briansmith/ring/pull/2447
Scores
CVSS v3
5.3
EPSS
0.0026
EPSS Percentile
49.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (10)
crates.io/ring
0 - 0.17.12crates.io
Red Hat/Red Hat Enterprise Linux 10
Red Hat/Red Hat Enterprise Linux 6
Red Hat/Red Hat Enterprise Linux 7
Red Hat/Red Hat Enterprise Linux 8
Red Hat/Red Hat Enterprise Linux 9
Red Hat/Red Hat OpenShift Container Platform 4
Red Hat/Red Hat Satellite 6
Red Hat/Red Hat Trusted Artifact Signer
Red Hat/Red Hat Trusted Profile Analyzer
Published
May 09, 2025
Tracked Since
Feb 18, 2026