fix(deps): update rust crate openssl to v0.10.70 [security] #1551
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.10.68
->0.10.70
GitHub Vulnerability Alerts
CVE-2025-24898
Impact
ssl::select_next_proto
can return a slice pointing into theserver
argument's buffer but with a lifetime bound to theclient
argument. In situations where theserver
buffer's lifetime is shorter than theclient
buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client.Patches
openssl
0.10.70 fixes the signature ofssl::select_next_proto
to properly constrain the output buffer's lifetime to that of both input buffers.Workarounds
In standard usage of
ssl::select_next_proto
in the callback passed toSslContextBuilder::set_alpn_select_callback
, code is only affected if theserver
buffer is constructed within the callback. For example:Not vulnerable - the server buffer has a
'static
lifetime:Not vulnerable - the server buffer outlives the handshake:
Vulnerable - the server buffer is freed when the callback returns:
References
https://github.com/sfackler/rust-openssl/pull/2360
rust-openssl ssl::select_next_proto use after free
CVE-2025-24898 / GHSA-rpmj-rpgj-qmpm / RUSTSEC-2025-0004
More information
Details
Impact
ssl::select_next_proto
can return a slice pointing into theserver
argument's buffer but with a lifetime bound to theclient
argument. In situations where theserver
buffer's lifetime is shorter than theclient
buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client.Patches
openssl
0.10.70 fixes the signature ofssl::select_next_proto
to properly constrain the output buffer's lifetime to that of both input buffers.Workarounds
In standard usage of
ssl::select_next_proto
in the callback passed toSslContextBuilder::set_alpn_select_callback
, code is only affected if theserver
buffer is constructed within the callback. For example:Not vulnerable - the server buffer has a
'static
lifetime:Not vulnerable - the server buffer outlives the handshake:
Vulnerable - the server buffer is freed when the callback returns:
References
https://github.com/sfackler/rust-openssl/pull/2360
Severity
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
ssl::select_next_proto use after free
CVE-2025-24898 / GHSA-rpmj-rpgj-qmpm / RUSTSEC-2025-0004
More information
Details
In
openssl
versions before0.10.70
,ssl::select_next_proto
can return a slice pointing into theserver
argument's buffer but with a lifetime bound to theclient
argument. In situations where theserver
buffer's lifetime is shorter than theclient
buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client.openssl
0.10.70 fixes the signature ofssl::select_next_proto
to properly constrain the output buffer's lifetime to that of both input buffers.In standard usage of
ssl::select_next_proto
in the callback passed toSslContextBuilder::set_alpn_select_callback
, code is only affected if theserver
buffer is constructed within the callback. For example:Not vulnerable - the server buffer has a
'static
lifetime:Not vulnerable - the server buffer outlives the handshake:
Vulnerable - the server buffer is freed when the callback returns:
Severity
Unknown
References
This data is provided by OSV and the Rust Advisory Database (CC0 1.0).
Release Notes
sfackler/rust-openssl (openssl)
v0.10.70
: openssl v0.10.70Compare Source
What's Changed
SslMethod::{dtls_client,dtls_server}
by @alex in https://github.com/sfackler/rust-openssl/pull/2358Full Changelog: sfackler/rust-openssl@openssl-v0.10.69...openssl-v0.10.70
v0.10.69
: openssl v0.10.69Compare Source
What's Changed
openssl-macro
to version0.1.1
by @caspermeijn in https://github.com/sfackler/rust-openssl/pull/2324New Contributors
Full Changelog: sfackler/rust-openssl@openssl-v0.10.68...openssl-v0.10.69
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Berlin, Automerge - "* 0-3 * * 1" in timezone Europe/Berlin.
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.