This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate kanidm-hsm-crypto

Dependencies

(8 total, 1 possibly insecure)

CrateRequiredLatestStatus
 argon2^0.5.20.5.3up to date
 hex^0.4.30.4.3up to date
 openssl ⚠️^0.10.570.10.73maybe insecure
 serde^1.01.0.219up to date
 tracing^0.1.370.1.41up to date
 tss-esapi=8.0.0-alpha7.6.0up to date
 tss-esapi-sys^0.5.00.5.0up to date
 zeroize^1.6.01.8.1up to date

Dev dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 tracing-subscriber^0.3.170.3.19up to date

Security Vulnerabilities

openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`

RUSTSEC-2025-0022

When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.

In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).

The maintainers thank quitbug for reporting this vulnerability to us.