Skip to content

Conversation

@depfu
Copy link

@depfu depfu bot commented Dec 18, 2025


🚨 Your current dependencies have known security vulnerabilities 🚨

This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!


Here is everything you need to know about this update. Please take a good look at what changed and the test results before merging this pull request.

What changed?

✳️ aws-sdk-s3 (1.151.0 → 1.208.0) · Repo · Changelog

Security Advisories 🚨

🚨 AWS SDK for Ruby's S3 Encryption Client has a Key Commitment Issue

Summary

S3 Encryption Client for Ruby is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3.

When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a new key.

Impact

Background - Key Commitment

There is a cryptographic property whereby under certain conditions, a single ciphertext can be decrypted into 2 different plaintexts by using different encryption keys. To address this issue, strong encryption schemes use what is known as "key commitment", a process by which an encrypted message can only be decrypted by one key; the key used to originally encrypt the message.

In older versions of S3EC, when customers are also using a feature called "Instruction File" to store EDKs, key commitment is not implemented because multiple EDKs could be associated to an underlying encrypted message object. For such customers an attack that leverages the lack of key commitment is possible. A bad actor would need two things to leverage this issue: (i) the ability to create a separate, rogue, EDK that will also decrypt the underlying object to produce desired plaintext, and (ii) permission to upload a new instruction file to the S3 bucket to replace the existing instruction file placed there by the user using the S3C. Any future attempt to decrypt the underlying encrypted message with the S3EC will unwittingly use the rogue EDK to produce a valid plaintext message.

Impacted versions: <= 1.207.0

Patches

We are introducing the concept of "key commitment" to S3EC where the EDK is cryptographically bound to the ciphertext in order to address this issue. In order to maintain compatibility for in-flight messages we are releasing the fix in two versions. A code-compatible minor version that can read messages with key-commitment but not write them, and a new major version that can both read and write messages with key-commitment. For maximum safety customers are asked to upgrade to the latest major version: 1.208.0 or later.

Workarounds

There are no workarounds, please upgrade to the suggested version of S3EC.

References

If customers have any questions or comments about this advisory, AWS SDK for Ruby asks that they contact AWS Security via the issue reporting page or directly via email to [email protected]. Please do not create a public GitHub issue.

Release Notes

Too many releases to show here. View the full release notes.

↗️ aws-eventstream (indirect, 1.3.0 → 1.4.0) · Repo

Sorry, we couldn't find anything useful about this release.

↗️ aws-partitions (indirect, 1.935.0 → 1.1196.0) · Repo

Sorry, we couldn't find anything useful about this release.

↗️ aws-sdk-core (indirect, 3.196.1 → 3.240.0) · Repo · Changelog

Release Notes

Too many releases to show here. View the full release notes.

↗️ aws-sdk-kms (indirect, 1.82.0 → 1.118.0) · Repo · Changelog

Release Notes

Too many releases to show here. View the full release notes.

↗️ aws-sigv4 (indirect, 1.8.0 → 1.12.1) · Repo · Changelog

🆕 logger (added, 1.7.0)


Depfu Status

Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with @depfu rebase.

All Depfu comment commands
@​depfu rebase
Rebases against your default branch and redoes this update
@​depfu recreate
Recreates this PR, overwriting any edits that you've made to it
@​depfu merge
Merges this PR once your tests are passing and conflicts are resolved
@​depfu cancel merge
Cancels automatic merging of this PR
@​depfu close
Closes this PR and deletes the branch
@​depfu reopen
Restores the branch and reopens this PR (if it's closed)
@​depfu pause
Ignores all future updates for this dependency and closes this PR
@​depfu pause [minor|major]
Ignores all future minor/major updates for this dependency and closes this PR
@​depfu resume
Future versions of this dependency will create PRs again (leaves this PR as is)

@depfu depfu bot added the depfu label Dec 18, 2025
@depfu
Copy link
Author

depfu bot commented Dec 24, 2025

Closed in favor of #99.

@depfu depfu bot closed this Dec 24, 2025
@depfu depfu bot deleted the depfu/update/aws-sdk-s3-1.208.0 branch December 24, 2025 23:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant