dependabot[bot] opened a new pull request, #1309:
URL: https://github.com/apache/iceberg-rust/pull/1309

   Bumps [ring](https://github.com/briansmith/ring) from 0.17.9 to 0.17.14.
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a 
href="https://github.com/briansmith/ring/blob/main/RELEASES.md";>ring's 
changelog</a>.</em></p>
   <blockquote>
   <h1>Version 0.17.14 (2025-03-11)</h1>
   <p>Fixed a performance bug in the AVX2-based AES-GCM implementation added in
   <em>ring</em> 0.17.13. This will be another notable performance improvement 
for most
   newish x86-64 systems. The performance issue impacted not just AES-GCM.</p>
   <p>Compatibility with GNU binutils 2.29 (used on Amazon Linux 2), and 
probably
   even earlier versions, was restored. It is expected that <em>ring</em> 
0.17.14 will
   build on all the systems that 0.17.12 would build on.</p>
   <h1>Version 0.17.13 (2025-03-06)</h1>
   <p>Increased MSRV to 1.66.0 to avoid bugs in earlier versions so that we can
   safely use <code>core::arch::x86_64::__cpuid</code> and 
<code>core::arch::x86::__cpuid</code> from
   Rust in future releases.</p>
   <p>AVX2-based VAES-CLMUL implementation. This will be a notable performance
   improvement for most newish x86-64 systems. This will likely raise the 
minimum
   binutils version supported for very old Linux distros.</p>
   <h1>Version 0.17.12 (2025-03-05)</h1>
   <p>Bug fix: <a 
href="https://redirect.github.com/briansmith/ring/pull/2447";>briansmith/ring#2447</a>
 for denial of service (DoS).</p>
   <ul>
   <li>
   <p>Fixes a panic in 
<code>ring::aead::quic::HeaderProtectionKey::new_mask()</code> when
   integer overflow checking is enabled. In the QUIC protocol, an attacker can
   induce this panic by sending a specially-crafted packet. Even unintentionally
   it is likely to occur in 1 out of every 2**32 packets sent and/or 
received.</p>
   </li>
   <li>
   <p>Fixes a panic on 64-bit targets in <code>ring::aead::{AES_128_GCM, 
AES_256_GCM}</code>
   when overflow checking is enabled, when encrypting/decrypting approximately
   68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. 
Protocols
   like TLS and SSH are not affected by this because those protocols break large
   amounts of data into small chunks. Similarly, most applications will not
   attempt to encrypt/decrypt 64GB of data in one chunk.</p>
   </li>
   </ul>
   <p>Overflow checking is not enabled in release mode by default, but
   <code>RUSTFLAGS=&quot;-C overflow-checks&quot;</code> or 
<code>overflow-checks = true</code> in the Cargo.toml
   profile can override this. Overflow checking is usually enabled by default in
   debug mode.</p>
   </blockquote>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li>See full diff in <a 
href="https://github.com/briansmith/ring/commits";>compare view</a></li>
   </ul>
   </details>
   <br />
   
   
   [![Dependabot compatibility 
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=ring&package-manager=cargo&previous-version=0.17.9&new-version=0.17.14)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)
   
   Dependabot will resolve any conflicts with this PR as long as you don't 
alter it yourself. You can also trigger a rebase manually by commenting 
`@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   <details>
   <summary>Dependabot commands and options</summary>
   <br />
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that 
have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI 
passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and 
block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. 
You can achieve the same result by closing it manually
   - `@dependabot show <dependency name> ignore conditions` will show all of 
the ignore conditions of the specified dependency
   - `@dependabot ignore this major version` will close this PR and stop 
Dependabot creating any more for this major version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop 
Dependabot creating any more for this minor version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop 
Dependabot creating any more for this dependency (unless you reopen the PR or 
upgrade to it yourself)
   You can disable automated security fix PRs for this repo from the [Security 
Alerts page](https://github.com/apache/iceberg-rust/network/alerts).
   
   </details>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@iceberg.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@iceberg.apache.org
For additional commands, e-mail: issues-h...@iceberg.apache.org

Reply via email to