This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate keyring

Dependencies

(10 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 byteorder^1.21.5.0up to date
 dbus-secret-service^4.0.14.0.3up to date
 linux-keyutils^0.20.2.4up to date
 log^0.4.220.4.27up to date
 openssl ⚠️^0.10.660.10.73maybe insecure
 secret-service^45.0.0out of date
 security-framework^33.2.0up to date
 windows-sys^0.600.60.2up to date
 zbus^45.9.0out of date
 zeroize^1.8.11.8.1up to date

Dev dependencies

(8 total, all up-to-date)

CrateRequiredLatestStatus
 base64^0.220.22.1up to date
 clap^44.5.42up to date
 doc-comment^0.30.3.3up to date
 env_logger^0.11.50.11.8up to date
 fastrand^22.3.0up to date
 rpassword^77.4.0up to date
 rprompt^22.2.0up to date
 whoami^1.51.6.0up to date

Security Vulnerabilities

openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`

RUSTSEC-2025-0022

When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.

In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).

The maintainers thank quitbug for reporting this vulnerability to us.