Skip to content

Commit 3488f17

Browse files
authored
build(deps): update boring requirement from 4.15.7 to 4.15.8 (#468)
See sfackler/rust-openssl#2360 and https://nvd.nist.gov/vuln/detail/CVE-2025-24898. From the rust-openssl PR: > `SSL_select_next_proto` can return a pointer into either the client or server buffers, but the type signature of the function previously only bound the output buffer to the client buffer. This can result in a UAF in situations where the server slice does not point to a long-lived allocation. Thanks to Matt Mastracci for reporting this issue.
1 parent 5ad4de9 commit 3488f17

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

Cargo.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,8 +114,8 @@ ipnet = "2.11.0"
114114
arc-swap = "1.7.0"
115115

116116
## boring-tls
117-
boring2 = { version = "4.15.7", features = ["pq-experimental", "cert-compression"] }
118-
tokio-boring2 = { version = "4.15.7", features = ["pq-experimental"] }
117+
boring2 = { version = "4.15.8", features = ["pq-experimental", "cert-compression"] }
118+
tokio-boring2 = { version = "4.15.8", features = ["pq-experimental"] }
119119
linked_hash_set = "0.1"
120120

121121
# Optional deps...

0 commit comments

Comments
 (0)