secrets-manager
secrets-manager copied to clipboard
Bump the cargo group across 1 directory with 4 updates
Bumps the cargo group with 4 updates in the /sdk/rust directory: tokio, tracing-subscriber, openssl and ring.
Updates tokio from 1.42.0 to 1.43.1
Release notes
Sourced from tokio's releases.
Tokio v1.43.0
1.43.0 (Jan 8th, 2025)
Added
- net: add
UdpSocket::peekmethods (#7068)- net: add support for Haiku OS (#7042)
- process: add
Command::into_std()(#7014)- signal: add
SignalKind::infoon illumos (#6995)- signal: add support for realtime signals on illumos (#7029)
Fixed
- io: don't call
set_lenbefore initializing vector inBlocking(#7054)- macros: suppress
clippy::needless_returnin#[tokio::main](#6874)- runtime: fix thread parking on WebAssembly (#7041)
Changes
- chore: use unsync loads for
unsync_load(#7073)- io: use
Buf::put_bytesinRepeatread impl (#7055)- task: drop the join waker of a task eagerly (#6986)
Changes to unstable APIs
- metrics: improve flexibility of H2Histogram Configuration (#6963)
- taskdump: add accessor methods for backtrace (#6975)
Documented
- io: clarify
ReadBuf::uninitallows initialized buffers as well (#7053)- net: fix ambiguity in
TcpStream::try_write_vectoreddocs (#7067)- runtime: fix
LocalRuntimedoc links (#7074)- sync: extend documentation for
watch::Receiver::wait_for(#7038)- sync: fix typos in
OnceCelldocs (#7047)#6874: tokio-rs/tokio#6874 #6963: tokio-rs/tokio#6963 #6975: tokio-rs/tokio#6975 #6986: tokio-rs/tokio#6986 #6995: tokio-rs/tokio#6995 #7014: tokio-rs/tokio#7014 #7029: tokio-rs/tokio#7029 #7038: tokio-rs/tokio#7038 #7041: tokio-rs/tokio#7041 #7042: tokio-rs/tokio#7042 #7047: tokio-rs/tokio#7047 #7053: tokio-rs/tokio#7053 #7054: tokio-rs/tokio#7054 #7055: tokio-rs/tokio#7055
... (truncated)
Commits
a7b658cchore: prepare Tokio v1.43.1 releasec1c8d10Merge remote-tracking branch 'origin/tokio-1.38.x' into forward-port-1.38.xaa303bcchore: prepare Tokio v1.38.2 release7b6ccb5chore: backport CI fixes4b174cesync: fix cloning value when receiving from broadcast channel5f3296dchore: prepare Tokio v1.43.0 (#7079)cc974a6chore: prepare tokio-macros v2.5.0 (#7078)15495fdmetrics: improve flexibility of H2Histogram Configuration (#6963)ad41834io: don't callset_lenbefore initializing vector inBlocking(#7054)bd3e857runtime: moveis_join_waker_setassertion inunset_waker(#7072)- Additional commits viewable in compare view
Updates tracing-subscriber from 0.2.25 to 0.3.20
Release notes
Sourced from tracing-subscriber's releases.
tracing-subscriber 0.3.20
Security Fix: ANSI Escape Sequence Injection (CVE-TBD)
Impact
Previous versions of tracing-subscriber were vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to:
- Manipulate terminal title bars
- Clear screens or modify terminal display
- Potentially mislead users through terminal manipulation
In isolation, impact is minimal, however security issues have been found in terminal emulators that enabled an attacker to use ANSI escape sequences via logs to exploit vulnerabilities in the terminal emulator.
Solution
Version 0.3.20 fixes this vulnerability by escaping ANSI control characters in when writing events to destinations that may be printed to the terminal.
Affected Versions
All versions of tracing-subscriber prior to 0.3.20 are affected by this vulnerability.
Recommendations
Immediate Action Required: We recommend upgrading to tracing-subscriber 0.3.20 immediately, especially if your application:
- Logs user-provided input (form data, HTTP headers, query parameters, etc.)
- Runs in environments where terminal output is displayed to users
Migration
This is a patch release with no breaking API changes. Simply update your Cargo.toml:
[dependencies] tracing-subscriber = "0.3.20"Acknowledgments
We would like to thank zefr0x who responsibly reported the issue at
[email protected].If you believe you have found a security vulnerability in any tokio-rs project, please email us at
[email protected].tracing-subscriber 0.3.19
[ [crates.io][crate-0.3.19] ] | [ [docs.rs][docs-0.3.19] ]
This release updates the
tracingdependency to [v0.1.41][tracing-0.1.41] and thetracing-serdedependency to [v0.2.0][tracing-serde-0.2.0].Added
... (truncated)
Commits
4c52ca5fmt: fix ANSI escape sequence injection vulnerability (#3368)f71cebesubscriber: impl Clone for EnvFilter (#3360)3a1f571Fix CI (#3361)e63ef57chore: prepare tracing-attributes 0.1.30 (#3316)6e59a13attributes: fix tracing::instrument regression around shadowing (#3311)e4df761tracing: update core to 0.1.34 and attributes to 0.1.29 (#3305)643f392chore: prepare tracing-attributes 0.1.29 (#3304)d08e7a6chore: prepare tracing-core 0.1.34 (#3302)6e70c57tracing-subscriber: count numbers of enters inTimings(#2944)c01d4fdfix docs and enable CI onmainbranch (#3295)- Additional commits viewable in compare view
Updates openssl from 0.10.68 to 0.10.75
Release notes
Sourced from openssl's releases.
openssl-v0.10.75
What's Changed
- Fix a few typos (most of them found with codespell) by
@botovqin rust-openssl/rust-openssl#2502- Use SHA256 test variant instead of SHA1 by
@abbrain rust-openssl/rust-openssl#2504- pin home to an older version on MSRV CI by
@alexin rust-openssl/rust-openssl#2509- Implement set_rsa_oaep_label for AWS-LC/BoringSSL by
@goffriein rust-openssl/rust-openssl#2508- sys/evp: add EVP_MAC symbols by
@huwcbjonesin rust-openssl/rust-openssl#2510- CI: bump LibreSSL 4.x branches to latest releases by
@botovqin rust-openssl/rust-openssl#2513- Fix unsound OCSP find_status handling of optional next_update field by
@alexin rust-openssl/rust-openssl#2517- Release openssl v0.10.75 and openssl-sys v0.9.111 by
@alexin rust-openssl/rust-openssl#2518New Contributors
@abbramade their first contribution in rust-openssl/rust-openssl#2504@goffriemade their first contribution in rust-openssl/rust-openssl#2508Full Changelog: https://github.com/rust-openssl/rust-openssl/compare/openssl-v0.10.74...openssl-v0.10.75
openssl-v0.10.74
What's Changed
- [AIX] use /usr to find_openssl_dir by
@daltentyin rust-openssl/rust-openssl#2401- Improve support for OPENSSL_NO_COMP and OPENSSL_NO_SRTP by
@justsmthin rust-openssl/rust-openssl#2423- Add aws-lc-fips feature to allow linking the aws-lc-fips-sys crate by
@skmcgrailin rust-openssl/rust-openssl#2424- variety of fixes for warnings in new rust by
@alexin rust-openssl/rust-openssl#2427- Some API adjustments for LibreSSL 4.2.0 by
@botovqin rust-openssl/rust-openssl#2426- Update OpenSSL documentation URLs to new docs.openssl.org domain by
@alexin rust-openssl/rust-openssl#2430- pkey_ctx: add ability to generate DSA params & keys by
@huwcbjonesin rust-openssl/rust-openssl#2432- Run tests on windows-11-arm by
@saschanazin rust-openssl/rust-openssl#2407- pkey_ctx: add ability to generate EC params & keys by
@huwcbjonesin rust-openssl/rust-openssl#2434- pkey_ctx: add ability to generate DH params & keys by
@huwcbjonesin rust-openssl/rust-openssl#2433- pkey_ctx: add ability to generate RSA keys by
@huwcbjonesin rust-openssl/rust-openssl#2431- expose more verifier flags/errors for libressl by
@botovqin rust-openssl/rust-openssl#2441- sys/evp: set/get params bindings by
@huwcbjonesin rust-openssl/rust-openssl#2436- Add support for argon2d and argon2i variants by
@greateggsgregin rust-openssl/rust-openssl#2416- Bump actions/checkout from 4 to 5 by
@dependabot[bot] in rust-openssl/rust-openssl#2443- Update bindgen; Update MSRV to 1.70 by
@justsmthin rust-openssl/rust-openssl#2438- macros: fully qualify imports by
@huwcbjonesin rust-openssl/rust-openssl#2445- Disable AES-CFB128 ciphers for BoringSSL by
@alebastrin rust-openssl/rust-openssl#2447- Fix missing "__off_t" on NetBSD 10 by
@alebastrin rust-openssl/rust-openssl#2448- ML-KEM/ML-DSA part 1: openssl-sys changes by
@swensonin rust-openssl/rust-openssl#2450- sys: add symbols to construct an EVP_PKEY from a param builder by
@huwcbjonesin rust-openssl/rust-openssl#2453- ec-point: add set_affine_coordinates by
@huwcbjonesin rust-openssl/rust-openssl#2455- openssl-sys: add more functions to replace non-deprecated ones by
@huwcbjonesin rust-openssl/rust-openssl#2457- ML-KEM/ML-DSA part 2: param builder by
@swensonin rust-openssl/rust-openssl#2451- ML-KEM/ML-DSA part 3: param array locate octet string by
@swensonin rust-openssl/rust-openssl#2458- sys: add encoder & decoder symbols by
@huwcbjonesin rust-openssl/rust-openssl#2454- Add bindings for SSL_CIPHER_get_protocol_id by
@jedenastkain rust-openssl/rust-openssl#2462- sys/evp: add EVP_PKEY_eq and EVP_PKEY_parameters_eq by
@huwcbjonesin rust-openssl/rust-openssl#2463- openssl-sys: make it work without deprecated symbols by
@huwcbjonesin rust-openssl/rust-openssl#2452- drop old libressl versions by
@botovqin rust-openssl/rust-openssl#2473- Remove support for LibreSSL < 2.8 by
@botovqin rust-openssl/rust-openssl#2475
... (truncated)
Commits
09b90d0Merge pull request #2518 from alex/bump-for-release26533f3Release openssl v0.10.75 and openssl-sys v0.9.111395eccaMerge pull request #2517 from alex/claude/fix-ocsp-find-status-011CUqcGFNKeKJ...cc26867Fix unsound OCSP find_status handling of optional next_update field95aa8e8Merge pull request #2513 from botovq/libressl-stablee735a32CI: bump LibreSSL 4.x branches to latest releases21ab91dMerge pull request #2510 from huwcbjones/huw/sys/evp-macd9161dcsys/evp: add EVP_MAC symbols3fd4bf2Merge pull request #2508 from goffrie/oaep-label52022fdImplement set_rsa_oaep_label for AWS-LC/BoringSSL- Additional commits viewable in compare view
Updates ring from 0.17.8 to 0.17.14
Changelog
Sourced from ring's changelog.
Version 0.17.14 (2025-03-11)
Fixed a performance bug in the AVX2-based AES-GCM implementation added in ring 0.17.13. This will be another notable performance improvement for most newish x86-64 systems. The performance issue impacted not just AES-GCM.
Compatibility with GNU binutils 2.29 (used on Amazon Linux 2), and probably even earlier versions, was restored. It is expected that ring 0.17.14 will build on all the systems that 0.17.12 would build on.
Version 0.17.13 (2025-03-06)
Increased MSRV to 1.66.0 to avoid bugs in earlier versions so that we can safely use
core::arch::x86_64::__cpuidandcore::arch::x86::__cpuidfrom Rust in future releases.AVX2-based VAES-CLMUL implementation. This will be a notable performance improvement for most newish x86-64 systems. This will likely raise the minimum binutils version supported for very old Linux distros.
Version 0.17.12 (2025-03-05)
Bug fix: briansmith/ring#2447 for denial of service (DoS).
Fixes a panic in
ring::aead::quic::HeaderProtectionKey::new_mask()when integer overflow checking is enabled. In the QUIC protocol, an attacker can induce this panic by sending a specially-crafted packet. Even unintentionally it is likely to occur in 1 out of every 2**32 packets sent and/or received.Fixes a panic on 64-bit targets in
ring::aead::{AES_128_GCM, AES_256_GCM}when overflow checking is enabled, when encrypting/decrypting approximately 68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols like TLS and SSH are not affected by this because those protocols break large amounts of data into small chunks. Similarly, most applications will not attempt to encrypt/decrypt 64GB of data in one chunk.Overflow checking is not enabled in release mode by default, but
RUSTFLAGS="-C overflow-checks"oroverflow-checks = truein the Cargo.toml profile can override this. Overflow checking is usually enabled by default in debug mode.
Commits
- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.
Review the following changes in direct dependencies. Learn more about Socket for GitHub.
| Diff | Package | Supply Chain Security |
Vulnerability | Quality | Maintenance | License |
|---|---|---|---|---|---|---|
| cargo/tokio@1.42.0 ⏵ 1.43.1 | ||||||
| cargo/tracing-subscriber@0.2.25 ⏵ 0.3.20 |