@@ -2,14 +2,17 @@ Version 0.17.12 (2025-03-05)
2
2
============================
3
3
Bug fix: https://github.com/briansmith/ring/pull/2447 for denial of service (DoS).
4
4
5
- Fixes a panic in ` ring::aead::quic::HeaderProtectionKey::new_mask() ` when
6
- integer overflow checking is enabled. Integer overflow checking is not enabled
7
- in release mode by default, but ` RUSTFLAGS="-C overflow-checks" ` or
8
- ` overflow-checks = true ` in the Cargo.toml profile can override this.
5
+ * Fixes a panic in ` ring::aead::quic::HeaderProtectionKey::new_mask() ` when
6
+ integer overflow checking is enabled.
9
7
10
- Fixes a panic in when using ` ring::aead::{AES_128_GCM, AES_256_GCM} ` when
11
- integer overflow checking is enabled, when encrypting/decrypting approximately
12
- 68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Integer
13
- overflow checking is not enabled in release mode by default, but
8
+ * Fixes a panic on 64-bit targets in ` ring::aead::{AES_128_GCM, AES_256_GCM} `
9
+ when overflow checking is enabled, when encrypting/decrypting approximately
10
+ 68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols
11
+ like TLS and SSH are not affected by this because those protocols break large
12
+ amounts of data into small chunks. Similarly, most applications will not
13
+ attempt to encrypt/decrypt 64GB of data in one chunk.
14
+
15
+ Overflow checking is not enabled in release mode by default, but
14
16
` RUSTFLAGS="-C overflow-checks" ` or ` overflow-checks = true ` in the Cargo.toml
15
- profile can override this.
17
+ profile can override this. Overflow checking is usually enabled by default in
18
+ debug mode.
0 commit comments