This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate keyring

Dependencies

(10 total, 3 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 byteorder^1.21.5.0up to date
 dbus-secret-service^4.0.14.1.0up to date
 linux-keyutils^0.20.2.4up to date
 log^0.4.220.4.29up to date
 openssl ⚠️^0.10.660.10.76maybe insecure
 secret-service^45.1.0out of date
 security-framework^33.7.0up to date
 windows-sys^0.600.61.2out of date
 zbus^45.14.0out of date
 zeroize^1.8.11.8.2up to date

Dev dependencies

(8 total, 1 outdated)

CrateRequiredLatestStatus
 base64^0.220.22.1up to date
 clap^44.5.60up to date
 doc-comment^0.30.3.4up to date
 env_logger^0.11.50.11.9up to date
 fastrand^22.3.0up to date
 rpassword^77.4.0up to date
 rprompt^22.2.0up to date
 whoami^1.52.1.1out of date

Security Vulnerabilities

openssl: Use-After-Free in `Md::fetch` and `Cipher::fetch`

RUSTSEC-2025-0022

When a Some(...) value was passed to the properties argument of either of these functions, a use-after-free would result.

In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to CString::drop's behavior).

The maintainers thank quitbug for reporting this vulnerability to us.