Allocation of Resources Without Limits or Throttling Affecting ring package, versions <0.17.12


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-RING-9376718
  • published9 Mar 2025
  • disclosed7 Mar 2025
  • creditUnknown

Introduced: 7 Mar 2025

New CVE NOT AVAILABLE CWE-770  (opens in a new tab)

How to fix?

Upgrade ring to version 0.17.12 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the HeaderProtectionKey::new_mask function. An attacker can induce a panic by sending a specially-crafted packet. This is only exploitable if overflow checking is enabled, which is not the default setting in release mode but can be enabled via RUSTFLAGS="-C overflow-checks" or overflow-checks = true in the Cargo.toml profile. Similarly, operations using AES_128_GCM and AES_256_GCM may also panic when processing large data chunks (about 64 gigabytes) under the same conditions, although common protocols like TLS and SSH are not affected as they process data in smaller segments.

CVSS Base Scores

version 4.0
version 3.1