Skip to content

Commit c0b2e84

Browse files
committed
Clarify RELEASES.md.
1 parent 15ff215 commit c0b2e84

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

RELEASES.md

+12-9
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,17 @@ Version 0.17.12 (2025-03-05)
22
============================
33
Bug fix: https://github.com/briansmith/ring/pull/2447 for denial of service (DoS).
44

5-
Fixes a panic in `ring::aead::quic::HeaderProtectionKey::new_mask()` when
6-
integer overflow checking is enabled. Integer overflow checking is not enabled
7-
in release mode by default, but `RUSTFLAGS="-C overflow-checks"` or
8-
`overflow-checks = true` in the Cargo.toml profile can override this.
5+
* Fixes a panic in `ring::aead::quic::HeaderProtectionKey::new_mask()` when
6+
integer overflow checking is enabled.
97

10-
Fixes a panic in when using `ring::aead::{AES_128_GCM, AES_256_GCM}` when
11-
integer overflow checking is enabled, when encrypting/decrypting approximately
12-
68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Integer
13-
overflow checking is not enabled in release mode by default, but
8+
* Fixes a panic on 64-bit targets in `ring::aead::{AES_128_GCM, AES_256_GCM}`
9+
when overflow checking is enabled, when encrypting/decrypting approximately
10+
68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols
11+
like TLS and SSH are not affected by this because those protocols break large
12+
amounts of data into small chunks. Similarly, most applications will not
13+
attempt to encrypt/decrypt 64GB of data in one chunk.
14+
15+
Overflow checking is not enabled in release mode by default, but
1416
`RUSTFLAGS="-C overflow-checks"` or `overflow-checks = true` in the Cargo.toml
15-
profile can override this.
17+
profile can override this. Overflow checking is usually enabled by default in
18+
debug mode.

0 commit comments

Comments
 (0)