Skip to content

chore(deps): update rust crate tracing-subscriber to v0.3.20 [security]#127

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/crate-tracing-subscriber-vulnerability
Open

chore(deps): update rust crate tracing-subscriber to v0.3.20 [security]#127
renovate[bot] wants to merge 1 commit intomainfrom
renovate/crate-tracing-subscriber-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Aug 31, 2025

Coming soon: The Renovate bot (GitHub App) will be renamed to Mend. PRs from Renovate will soon appear from 'Mend'. Learn more here.

This PR contains the following updates:

Package Type Update Change
tracing-subscriber (source) workspace.dependencies patch 0.3.19 -> 0.3.20

GitHub Vulnerability Alerts

CVE-2025-58160

Impact

Previous versions of tracing-subscriber were vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to:

  • Manipulate terminal title bars
  • Clear screens or modify terminal display
  • Potentially mislead users through terminal manipulation

In isolation, impact is minimal, however security issues have been found in terminal emulators that enabled an attacker to use ANSI escape sequences via logs to exploit vulnerabilities in the terminal emulator.

Patches

tracing-subscriber version 0.3.20 fixes this vulnerability by escaping ANSI control characters in when writing events to destinations that may be printed to the terminal.

Workarounds

Avoid printing logs to terminal emulators without escaping ANSI control sequences.

References

https://www.packetlabs.net/posts/weaponizing-ansi-escape-sequences/

Acknowledgments

We would like to thank zefr0x who responsibly reported the issue at security@tokio.rs.

If you believe you have found a security vulnerability in any tokio-rs project, please email us at security@tokio.rs.


Release Notes

tokio-rs/tracing (tracing-subscriber)

v0.3.20: tracing-subscriber 0.3.20

Compare Source

Security Fix: ANSI Escape Sequence Injection (CVE-TBD)

Impact

Previous versions of tracing-subscriber were vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to:

  • Manipulate terminal title bars
  • Clear screens or modify terminal display
  • Potentially mislead users through terminal manipulation

In isolation, impact is minimal, however security issues have been found in terminal emulators that enabled an attacker to use ANSI escape sequences via logs to exploit vulnerabilities in the terminal emulator.

Solution

Version 0.3.20 fixes this vulnerability by escaping ANSI control characters in when writing events to destinations that may be printed to the terminal.

Affected Versions

All versions of tracing-subscriber prior to 0.3.20 are affected by this vulnerability.

Recommendations

Immediate Action Required: We recommend upgrading to tracing-subscriber 0.3.20 immediately, especially if your application:

  • Logs user-provided input (form data, HTTP headers, query parameters, etc.)
  • Runs in environments where terminal output is displayed to users

Migration

This is a patch release with no breaking API changes. Simply update your Cargo.toml:

[dependencies]
tracing-subscriber = "0.3.20"

Acknowledgments

We would like to thank zefr0x who responsibly reported the issue at security@tokio.rs.

If you believe you have found a security vulnerability in any tokio-rs project, please email us at security@tokio.rs.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link

Your image ghcr.io/ekhorn/spaced/item_socket:219443a759cb34a589969fd4bf15b3a2a7de16ef critical: 0 high: 0 medium: 0 low: 0
Current base image distroless/static:nonroot critical: 0 high: 0 medium: 0 low: 0

@github-actions
Copy link

🔍 Vulnerabilities of ghcr.io/ekhorn/spaced/item_socket:219443a759cb34a589969fd4bf15b3a2a7de16ef

📦 Image Reference ghcr.io/ekhorn/spaced/item_socket:219443a759cb34a589969fd4bf15b3a2a7de16ef
digestsha256:ebd2b9a0624c2d7c2fb83449339083d245ae5743efd1ca90cdd849b09155cde4
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
platformlinux/amd64
size13 MB
packages13
📦 Base Image gcr.io/distroless/static:nonroot
digestsha256:43719ef69e9adb4d3458ee45c633282a3d13f1b4ebc1859adddfe4aade3a9ac7
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0

@github-actions
Copy link

Recommended fixes for image ghcr.io/ekhorn/spaced/item_socket:219443a759cb34a589969fd4bf15b3a2a7de16ef

Base image is :nonroot

Digest
Vulnerabilities
Size0 B
Packages0

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

✅ There are no tag recommendations at this time.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants