This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate rpm

Dependencies

(22 total, 6 outdated, 2 possibly insecure)

CrateRequiredLatestStatus
 bitflags^22.11.0up to date
 bzip2^0.4.40.6.1out of date
 chrono ⚠️^0.40.4.44maybe insecure
 cpio^0.40.4.1up to date
 digest^0.100.11.2out of date
 enum-display-derive^0.10.1.1up to date
 enum-primitive-derive^0.30.3.0up to date
 flate2^11.1.9up to date
 hex^0.40.4.3up to date
 itertools^0.130.14.0out of date
 log^0.40.4.29up to date
 md-5^0.100.10.6up to date
 nom^78.0.0out of date
 num^0.40.4.3up to date
 num-derive^0.40.4.2up to date
 num-traits^0.20.2.19up to date
 pgp ⚠️^0.14.00.19.0out of date
 sha1^0.100.10.6up to date
 sha2^0.100.11.0out of date
 thiserror^22.0.18up to date
 xz2^0.10.1.7up to date
 zstd^0.130.13.3up to date

Dev dependencies

(5 total, 2 outdated)

CrateRequiredLatestStatus
 env_logger^0.110.11.10up to date
 gethostname^0.51.1.0out of date
 hex-literal^0.41.1.0out of date
 pretty_assertions^1.31.4.1up to date
 serial_test^3.03.4.0up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

pgp: Panics on Malformed Untrusted Input

RUSTSEC-2024-0447

During a security audit, Radically Open Security discovered several reachable edge cases which allow an attacker to trigger rpgp crashes by providing crafted data.

Impact

When processing malformed input, rpgp can run into Rust panics which halt the program.

This can happen in the following scenarios:

  • Parsing OpenPGP messages from binary or armor format
  • Decrypting OpenPGP messages via decrypt_with_password()
  • Parsing or converting public keys
  • Parsing signed cleartext messages from armor format
  • Using malformed private keys to sign or encrypt

Given the affected components, we consider most attack vectors to be reachable by remote attackers during typical use cases of the rpgp library. The attack complexity is low since the malformed messages are generic, short, and require no victim-specific knowledge.

The result is a denial-of-service impact via program termination. There is no impact to confidentiality or integrity security properties.

Versions and Patches

All recent versions are affected by at least some of the above mentioned issues.

The vulnerabilities have been fixed with version 0.14.1. We recommend all users to upgrade to this version.

References

The security audit was made possible by the NLnet Foundation NGI Zero Core grant program for rpgp.