Skip to content

Commit 71a3565

Browse files
1 parent c6fc22b commit 71a3565

1 file changed

Lines changed: 26 additions & 5 deletions

File tree

advisories/unreviewed/2025/05/GHSA-c86p-w88r-qvqr/GHSA-c86p-w88r-qvqr.json renamed to advisories/github-reviewed/2025/05/GHSA-c86p-w88r-qvqr/GHSA-c86p-w88r-qvqr.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c86p-w88r-qvqr",
4-
"modified": "2025-05-09T18:30:39Z",
4+
"modified": "2025-05-09T19:42:41Z",
55
"published": "2025-05-09T18:30:38Z",
66
"aliases": [
77
"CVE-2025-4432"
88
],
9+
"summary": " ring has some AES functions that may panic when overflow checking is enabled in",
910
"details": "A flaw was found in Rust's Ring package. A panic may be triggered when overflow checking is enabled. In the QUIC protocol, this flaw allows an attacker to induce this panic by sending a specially crafted packet. It will likely occur unintentionally in 1 out of every 2**32 packets sent or received.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "crates.io",
21+
"name": "ring"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.17.13"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -36,7 +57,7 @@
3657
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350655"
3758
},
3859
{
39-
"type": "WEB",
60+
"type": "PACKAGE",
4061
"url": "https://github.com/briansmith/ring"
4162
},
4263
{
@@ -53,8 +74,8 @@
5374
"CWE-770"
5475
],
5576
"severity": "MODERATE",
56-
"github_reviewed": false,
57-
"github_reviewed_at": null,
77+
"github_reviewed": true,
78+
"github_reviewed_at": "2025-05-09T19:42:41Z",
5879
"nvd_published_at": "2025-05-09T16:15:25Z"
5980
}
6081
}

0 commit comments

Comments
 (0)