Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Apr 4, 2025

Bumps the cargo group with 1 update in the /anoncreds directory: openssl.
Bumps the cargo group with 5 updates in the /askar directory:

Package From To
curve25519-dalek 4.1.2 4.1.3
mio 0.8.10 0.8.11
rsa 0.9.6 0.9.8
sqlx 0.7.3 0.7.4
whoami 1.4.1 1.6.0

Bumps the cargo group with 3 updates in the /indy-vdr directory: openssl, ring and rustls.

Updates openssl from 0.10.64 to 0.10.72

Release notes

Sourced from openssl's releases.

openssl-v0.10.72

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.71...openssl-v0.10.72

openssl-v0.10.71

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.70...openssl-v0.10.71

openssl v0.10.70

What's Changed

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.69...openssl-v0.10.70

openssl v0.10.69

What's Changed

New Contributors

... (truncated)

Commits
  • 87085bd Merge pull request #2390 from alex/uaf-fix
  • d1a12e2 Fixed two UAFs and bumped versions for release
  • 7c7b2e6 Merge pull request #2389 from skmcgrail/aws-lc-follow-up
  • 34a477b Use --experimental with bindgen-cli with aws-lc build
  • d4bf071 Merge pull request #2386 from skmcgrail/aws-lc-follow-up
  • a86bf67 Remove comment
  • 705dbfb Fix test
  • e0df413 Skip final call for LibreSSL 4.1.0 for CCM mode
  • 2f1164b Enable additional capabilities for AWS-LC
  • dde9ffb Merge pull request #1805 from skmcgrail/aws-lc-support-final
  • Additional commits viewable in compare view

Updates curve25519-dalek from 4.1.2 to 4.1.3

Commits
  • 5312a03 curve: Bump version to 4.1.3 (#660)
  • b4f9e4d SECURITY: fix timing variability in backend/serial/u32/scalar.rs (#661)
  • 415892a SECURITY: fix timing variability in backend/serial/u64/scalar.rs (#659)
  • 56bf398 Updates license field to valid SPDX format (#647)
  • 9252fa5 Mitigate check-cfg until MSRV 1.77 (#652)
  • 1efe6a9 Fix a minor typo in signing.rs (#649)
  • cc3421a Indicate that the rand_core feature is required (#641)
  • 858c4ca Address new nightly clippy unnecessary qualifications (#639)
  • 31ccb67 Remove platforms in favor using CARGO_CFG_TARGET_POINTER_WIDTH (#636)
  • 19c7f4a Fix new nightly redundant import lint warns (#638)
  • Additional commits viewable in compare view

Updates mio from 0.8.10 to 0.8.11

Changelog

Sourced from mio's changelog.

0.8.11

Commits

Updates rsa from 0.9.6 to 0.9.8

Changelog

Sourced from rsa's changelog.

0.9.8 (2025-03-12)

Added

  • Doc comments to specify the rand version (#473)

#473: RustCrypto/RSA#473

0.9.7 (2024-11-26)

Fixed

  • Always validate keys in RsaPrivateKey::from_components (#459)
  • Do not crash when handling tiny keys in PKCS1v15 (#459)

#459: RustCrypto/RSA#459

Commits

Updates sqlx from 0.7.3 to 0.7.4

Changelog

Sourced from sqlx's changelog.

0.7.4 - 2024-03-11

38 pull requests were merged this release cycle.

This is officially the last release of the 0.7.x release cycle.

As of this release, development of 0.8.0 has begun on main and only high-priority bugfixes may be backported.

Added

  • [#2891]: feat: expose getters for connect options fields [[@​saiintbrisson]]
  • [#2902]: feat: add to_url_lossy to connect options [[@​lily-mosquitoes]]
  • [#2927]: Support query! for cargo-free systems [[@​kshramt]]
  • [#2997]: doc(FAQ): add entry explaining prepared statements [[@​abonander]]
  • [#3001]: Update README to clarify MariaDB support [[@​iangilfillan]]
  • [#3004]: feat(logging): Add numeric elapsed time field elapsed_secs [[@​iamjpotts]]
  • [#3007]: feat: add raw_sql API [[@​abonander]]
    • This hopefully makes it easier to find how to execute statements which are not supported by the default prepared statement interfaces query*() and query!().
    • Improved documentation across the board for the query*() functions.
    • Deprecated: execute_many() and fetch_many() on interfaces that use prepared statements.
      • Multiple SQL statements in one query string were only supported by SQLite because its prepared statement interface is the only way to execute SQL. All other database flavors forbid multiple statements in one prepared statement string as an extra defense against SQL injection.
      • The new raw_sql API retains this functionality because it explicitly does not use prepared statements. Raw or text-mode query interfaces generally allow multiple statements in one query string, and this is supported by all current databases. Due to their nature, however, one cannot use bind parameters with them.
      • If this change affects you, an issue is open for discussion: launchbadge/sqlx#3108
  • [#3011]: Added support to IpAddr with MySQL/MariaDB. [[@​Icerath]]
  • [#3013]: Add default implementation for PgInterval [[@​pawurb]]
  • [#3018]: Add default implementation for PgMoney [[@​pawurb]]
  • [#3026]: Update docs to reflect support for MariaDB data types [[@​iangilfillan]]
  • [#3037]: feat(mysql): allow to connect with mysql driver without default behavor [[@​darkecho731]]

Changed

... (truncated)

Commits
  • 635dba5 fix: deprecation in postgres::types::chrono
  • a2b89d7 fix: deprecation warnings in sqlite::types::chrono, document DATETIME beh...
  • 248d617 chore: prepare 0.7.4 release
  • d005111 fix: better I/O errors when migrate!() cannot read a file
  • 24be262 fix: restore Migrator to the public API
  • bbfd0d7 fix: AnyRow not support PgType::Varchar (#2976)
  • b29eab0 feat: add to_url_lossy to connect options (#2902)
  • 34860b7 fix(ci): just cfg-out the whole tests/sqlite/sqlcipher.rs
  • 791a7f5 doc(pg): document behavior of bigdecimal and rust_decimal with out-of-ran...
  • e5c18b3 fix: gate sqlcipher testing behind cfg to make development less annoying
  • Additional commits viewable in compare view

Updates whoami from 1.4.1 to 1.6.0

Release notes

Sourced from whoami's releases.

v1.6.0

Changelog

Added

  • Support for GNU/Hurd

Changed

  • Removed comment about hostname being limited to ASCII due to Unicode hostnames being supported on Windows
  • More descriptive error messages on the web target

Fixed

  • account() always returning username instead of user principal name on Windows
  • langs() now returns a list accurate to the POSIX locale spec
  • hostname() on Windows now returns PhysicalDnsHostname instead of NetBIOS
  • devicename(): Fixed reading escaped unix pretty names
  • Link error on Windows (in future Rust version)

What's Changed

New Contributors

Full Changelog: ardaku/whoami@v1.5.2...v1.6.0

Changelog

Sourced from whoami's changelog.

[1.6.0] - 2025-03-23

Added

  • Support for GNU/Hurd

Changed

  • Removed comment about hostname being limited to ASCII due to Unicode hostnames being supported on Windows
  • More descriptive error messages on the web target

Fixed

  • account() always returning username instead of user principal name on Windows
  • langs() now returns a list accurate to the POSIX locale spec
  • hostname() on Windows now returns PhysicalDnsHostname instead of NetBIOS
  • devicename(): Fixed reading escaped unix pretty names
  • Link error on Windows (in future Rust version)

[1.5.2] - 2024-09-02

Changed

  • Updated redox_syscall to 0.5
  • Replace target_os = daku with daku cfg
  • Improved repository documentation

[1.5.1] - 2024-03-09

Fixed

  • Broken link in docs

[1.5.0] - 2024-03-03

Added

  • WASI support
  • Redox support
  • Fallible functions
    • whoami::fallible::devicename()
    • whoami::fallible::devicename_os()
    • whoami::fallible::distro()
    • whoami::fallible::hostname() - notably doesn't normalize to lowercase
    • whoami::fallible::realname()
    • whoami::fallible::realname_os()
    • whoami::fallible::username()

... (truncated)

Commits
  • 8170882 Release v1.6.0 (#162)
  • 109da1c Backport v2->v1: Fix reading escaped unix pretty names (#178)
  • bc489c0 Version 1.6.0 pre.2 (#158)
  • 7aabbfa Add discriminants to ExtendedNameFormat enum (#156)
  • 7aba7a4 Backport v2 -> v1: Fix license link (#154)
  • d90a4f8 1.6.0-pre.1 and Backport v2 -> v1: Adjusts langs() to match POSIX locale spec...
  • a027097 Backport v2 -> v1: Improved error handling (#149)
  • d9df517 Backport v2 -> v1: Switch Windows hostname() to return `PhysicalDnsHostname...
  • 85933dc Backport v2 -> v1: Check more environment variables for language (#146)
  • ef86159 v1: Update wasm-bindgen to v0.2.89 (#138)
  • Additional commits viewable in compare view

Updates openssl from 0.10.64 to 0.10.72

Release notes

Sourced from openssl's releases.

openssl-v0.10.72

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.71...openssl-v0.10.72

openssl-v0.10.71

What's Changed

New Contributors

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.70...openssl-v0.10.71

openssl v0.10.70

What's Changed

Full Changelog: rust-openssl/rust-openssl@openssl-v0.10.69...openssl-v0.10.70

openssl v0.10.69

What's Changed

New Contributors

... (truncated)

Commits
  • 87085bd Merge pull request #2390 from alex/uaf-fix
  • d1a12e2 Fixed two UAFs and bumped versions for release
  • 7c7b2e6 Merge pull request #2389 from skmcgrail/aws-lc-follow-up
  • 34a477b Use --experimental with bindgen-cli with aws-lc build
  • d4bf071 Merge pull request #2386 from skmcgrail/aws-lc-follow-up
  • a86bf67 Remove comment
  • 705dbfb Fix test
  • e0df413 Skip final call for LibreSSL 4.1.0 for CCM mode
  • 2f1164b Enable additional capabilities for AWS-LC
  • dde9ffb Merge pull request #1805 from skmcgrail/aws-lc-support-final
  • Additional commits viewable in compare view

Updates ring from 0.17.8 to 0.17.14

Changelog

Sourced from ring's changelog.

Version 0.17.14 (2025-03-11)

Fixed a performance bug in the AVX2-based AES-GCM implementation added in ring 0.17.13. This will be another notable performance improvement for most newish x86-64 systems. The performance issue impacted not just AES-GCM.

Compatibility with GNU binutils 2.29 (used on Amazon Linux 2), and probably even earlier versions, was restored. It is expected that ring 0.17.14 will build on all the systems that 0.17.12 would build on.

Version 0.17.13 (2025-03-06)

Increased MSRV to 1.66.0 to avoid bugs in earlier versions so that we can safely use core::arch::x86_64::__cpuid and core::arch::x86::__cpuid from Rust in future releases.

AVX2-based VAES-CLMUL implementation. This will be a notable performance improvement for most newish x86-64 systems. This will likely raise the minimum binutils version supported for very old Linux distros.

Version 0.17.12 (2025-03-05)

Bug fix: briansmith/ring#2447 for denial of service (DoS).

  • Fixes a panic in ring::aead::quic::HeaderProtectionKey::new_mask() when integer overflow checking is enabled. In the QUIC protocol, an attacker can induce this panic by sending a specially-crafted packet. Even unintentionally it is likely to occur in 1 out of every 2**32 packets sent and/or received.

  • Fixes a panic on 64-bit targets in ring::aead::{AES_128_GCM, AES_256_GCM} when overflow checking is enabled, when encrypting/decrypting approximately 68,719,476,700 bytes (about 64 gigabytes) of data in a single chunk. Protocols like TLS and SSH are not affected by this because those protocols break large amounts of data into small chunks. Similarly, most applications will not attempt to encrypt/decrypt 64GB of data in one chunk.

Overflow checking is not enabled in release mode by default, but RUSTFLAGS="-C overflow-checks" or overflow-checks = true in the Cargo.toml profile can override this. Overflow checking is usually enabled by default in debug mode.

Commits

Updates rustls from 0.21.10 to 0.21.12

Commits
  • 3633152 Cargo: v0.21.11 -> v0.21.12
  • 0baaeba proj: MSRV 1.61 -> 1.63
  • 6fd691a tls13: fix clippy::unnecessary_lazy_evaluations finding
  • 6da5337 Test for illegal IP address in server name extension
  • 75f8857 Ignore server_name extension containing IP address
  • 7b8d1db Prepare 0.21.11
  • ebcb478 complete_io: bail out if progress is impossible
  • 20f35df Regression test for complete_io infinite loop bug
  • 2f2aae1 Don't specially handle unauthenticated close_notify alerts
  • e163587 Don't deny warnings from nightly clippy
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the cargo group with 1 update in the /anoncreds directory: [openssl](https://github.com/sfackler/rust-openssl).
Bumps the cargo group with 5 updates in the /askar directory:

| Package | From | To |
| --- | --- | --- |
| [curve25519-dalek](https://github.com/dalek-cryptography/curve25519-dalek) | `4.1.2` | `4.1.3` |
| [mio](https://github.com/tokio-rs/mio) | `0.8.10` | `0.8.11` |
| [rsa](https://github.com/RustCrypto/RSA) | `0.9.6` | `0.9.8` |
| [sqlx](https://github.com/launchbadge/sqlx) | `0.7.3` | `0.7.4` |
| [whoami](https://github.com/ardaku/whoami) | `1.4.1` | `1.6.0` |

Bumps the cargo group with 3 updates in the /indy-vdr directory: [openssl](https://github.com/sfackler/rust-openssl), [ring](https://github.com/briansmith/ring) and [rustls](https://github.com/rustls/rustls).


Updates `openssl` from 0.10.64 to 0.10.72
- [Release notes](https://github.com/sfackler/rust-openssl/releases)
- [Commits](rust-openssl/rust-openssl@openssl-v0.10.64...openssl-v0.10.72)

Updates `curve25519-dalek` from 4.1.2 to 4.1.3
- [Release notes](https://github.com/dalek-cryptography/curve25519-dalek/releases)
- [Commits](dalek-cryptography/curve25519-dalek@curve25519-4.1.2...curve25519-4.1.3)

Updates `mio` from 0.8.10 to 0.8.11
- [Release notes](https://github.com/tokio-rs/mio/releases)
- [Changelog](https://github.com/tokio-rs/mio/blob/master/CHANGELOG.md)
- [Commits](tokio-rs/mio@v0.8.10...v0.8.11)

Updates `rsa` from 0.9.6 to 0.9.8
- [Changelog](https://github.com/RustCrypto/RSA/blob/master/CHANGELOG.md)
- [Commits](RustCrypto/RSA@v0.9.6...v0.9.8)

Updates `sqlx` from 0.7.3 to 0.7.4
- [Changelog](https://github.com/launchbadge/sqlx/blob/main/CHANGELOG.md)
- [Commits](launchbadge/sqlx@v0.7.3...v0.7.4)

Updates `whoami` from 1.4.1 to 1.6.0
- [Release notes](https://github.com/ardaku/whoami/releases)
- [Changelog](https://github.com/ardaku/whoami/blob/v1.6.0/CHANGELOG.md)
- [Commits](ardaku/whoami@v1.4.1...v1.6.0)

Updates `openssl` from 0.10.64 to 0.10.72
- [Release notes](https://github.com/sfackler/rust-openssl/releases)
- [Commits](rust-openssl/rust-openssl@openssl-v0.10.64...openssl-v0.10.72)

Updates `ring` from 0.17.8 to 0.17.14
- [Changelog](https://github.com/briansmith/ring/blob/main/RELEASES.md)
- [Commits](https://github.com/briansmith/ring/commits)

Updates `rustls` from 0.21.10 to 0.21.12
- [Release notes](https://github.com/rustls/rustls/releases)
- [Changelog](https://github.com/rustls/rustls/blob/main/CHANGELOG.md)
- [Commits](rustls/rustls@v/0.21.10...v/0.21.12)

---
updated-dependencies:
- dependency-name: openssl
  dependency-version: 0.10.72
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: curve25519-dalek
  dependency-version: 4.1.3
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: mio
  dependency-version: 0.8.11
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: rsa
  dependency-version: 0.9.8
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: sqlx
  dependency-version: 0.7.4
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: whoami
  dependency-version: 1.6.0
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: openssl
  dependency-version: 0.10.72
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: ring
  dependency-version: 0.17.14
  dependency-type: indirect
  dependency-group: cargo
- dependency-name: rustls
  dependency-version: 0.21.12
  dependency-type: indirect
  dependency-group: cargo
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file rust Pull requests that update rust code labels Apr 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file rust Pull requests that update rust code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant