Skip to content

chore(deps): update rust crate openssl to v0.10.72 [security]#166

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/crate-openssl-vulnerability
Open

chore(deps): update rust crate openssl to v0.10.72 [security]#166
renovate[bot] wants to merge 1 commit intomainfrom
renovate/crate-openssl-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Feb 3, 2025

This PR contains the following updates:

Package Type Update Change
openssl dependencies patch 0.10.680.10.72

GitHub Vulnerability Alerts

CVE-2025-24898

Impact

ssl::select_next_proto can return a slice pointing into the server argument's buffer but with a lifetime bound to the client argument. In situations where the server buffer's lifetime is shorter than the client buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client.

Patches

openssl 0.10.70 fixes the signature of ssl::select_next_proto to properly constrain the output buffer's lifetime to that of both input buffers.

Workarounds

In standard usage of ssl::select_next_proto in the callback passed to SslContextBuilder::set_alpn_select_callback, code is only affected if the server buffer is constructed within the callback. For example:

Not vulnerable - the server buffer has a 'static lifetime:

builder.set_alpn_select_callback(|_, client_protos| {
    ssl::select_next_proto(b"\x02h2", client_protos).ok_or_else(AlpnError::NOACK)
});

Not vulnerable - the server buffer outlives the handshake:

let server_protos = b"\x02h2".to_vec();
builder.set_alpn_select_callback(|_, client_protos| {
    ssl::select_next_proto(&server_protos, client_protos).ok_or_else(AlpnError::NOACK)
});

Vulnerable - the server buffer is freed when the callback returns:

builder.set_alpn_select_callback(|_, client_protos| {
    let server_protos = b"\x02h2".to_vec();
    ssl::select_next_proto(&server_protos, client_protos).ok_or_else(AlpnError::NOACK)
});

References

https://github.com/sfackler/rust-openssl/pull/2360

GHSA-4fcv-w3qc-ppgg

When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.

In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).

The maintainers thank quitbug for reporting this vulnerability to us.


Release Notes

rust-openssl/rust-openssl (openssl)

v0.10.72

Compare Source

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.71...openssl-v0.10.72

v0.10.71

Compare Source

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.70...openssl-v0.10.71

v0.10.70: openssl v0.10.70

Compare Source

What's Changed

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.69...openssl-v0.10.70

v0.10.69: openssl v0.10.69

Compare Source

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.68...openssl-v0.10.69


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from bartvdbraak February 3, 2025 22:28
@renovate renovate bot force-pushed the renovate/crate-openssl-vulnerability branch from c4d2efe to 698ab58 Compare April 4, 2025 22:19
@renovate renovate bot changed the title fix(deps): update rust crate openssl to v0.10.70 [security] fix(deps): update rust crate openssl to v0.10.72 [security] Apr 4, 2025
@renovate renovate bot force-pushed the renovate/crate-openssl-vulnerability branch from 698ab58 to 1763ec9 Compare August 10, 2025 12:44
@renovate renovate bot changed the title fix(deps): update rust crate openssl to v0.10.72 [security] chore(deps): update rust crate openssl to v0.10.72 [security] Sep 25, 2025
@renovate renovate bot force-pushed the renovate/crate-openssl-vulnerability branch from 1763ec9 to e5d65ad Compare December 10, 2025 11:11
@renovate renovate bot force-pushed the renovate/crate-openssl-vulnerability branch from e5d65ad to e197728 Compare March 14, 2026 06:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants