Skip to content

Commit f94c722

Browse files
authored
build(deps): update boring requirement from 4.15.7 to 4.15.8 (#467)
See sfackler/rust-openssl#2360 and https://nvd.nist.gov/vuln/detail/CVE-2025-24898. From the rust-openssl PR: > `SSL_select_next_proto` can return a pointer into either the client or server buffers, but the type signature of the function previously only bound the output buffer to the client buffer. This can result in a UAF in situations where the server slice does not point to a long-lived allocation. Thanks to Matt Mastracci for reporting this issue.
1 parent 0a2e439 commit f94c722

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Cargo.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,9 +113,9 @@ socket2 = { version = "0.5", features = ["all"] }
113113
lru = { version = "0.13", default-features = false }
114114

115115
## boring-tls
116-
boring2 = { version = "4.15.7", features = ["pq-experimental"] }
117-
boring-sys2 = { version = "4.15.7", features = ["pq-experimental"] }
118-
tokio-boring2 = { version = "4.15.7", features = ["pq-experimental"] }
116+
boring2 = { version = "4.15.8", features = ["pq-experimental"] }
117+
boring-sys2 = { version = "4.15.8", features = ["pq-experimental"] }
118+
tokio-boring2 = { version = "4.15.8", features = ["pq-experimental"] }
119119
foreign-types = "0.5.0"
120120
linked_hash_set = "0.1"
121121

0 commit comments

Comments
 (0)