Skip to content

Commit b62b4c3

Browse files
committed
*ring* AES-CTR may panic when overflow checking is enabled.
1 parent ba55c17 commit b62b4c3

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

crates/ring/RUSTSEC-0000-0000.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
```toml
2+
[advisory]
3+
id = "RUSTSEC-0000-0000"
4+
package = "ring"
5+
date = "2025-03-06"
6+
url = "https://github.com/briansmith/ring/blob/main/RELEASES.md#version-01712-2025-03-05"
7+
categories = ["denial-of-service"]
8+
9+
[versions]
10+
patched = [">= 0.17.12"]
11+
unaffected = []
12+
```
13+
14+
# Some AES functions may panic when overflow checking is enabled.
15+
16+
`ring::aead::quic::HeaderProtectionKey::new_mask()` may panic when overflow
17+
checking is enabled.
18+
19+
On 64-bit targets in `ring::aead::{AES_128_GCM, AES_256_GCM}` may panic when
20+
overflow checking is enabled, when encrypting/decrypting approximately
21+
68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols
22+
like TLS and SSH are not affected by this because those protocols break large
23+
amounts of data into small chunks. Similarly, most applications will not
24+
attempt to encrypt/decrypt 64GB of data in one chunk.
25+
26+
Overflow checking is not enabled in release mode by default, but
27+
`RUSTFLAGS="-C overflow-checks"` or `overflow-checks = true` in the Cargo.toml
28+
profile can override this. Overflow checking is usually enabled by default in
29+
debug mode.

0 commit comments

Comments
 (0)