This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate keepass-ng

Dependencies

(32 total, 12 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 aes^0.80.9.0out of date
 base32^0.50.5.1up to date
 base64^0.220.22.1up to date
 block-modes^0.90.9.1up to date
 byteorder^11.5.0up to date
 cbc^0.10.2.0out of date
 chacha20^0.90.10.0out of date
 challenge_response^0.50.5.46up to date
 chrono ⚠️^0.40.4.44maybe insecure
 cipher^0.40.5.1out of date
 clap^44.6.1up to date
 erased-serde^0.40.4.10up to date
 flate2^11.1.9up to date
 getrandom^0.30.4.2out of date
 hex^0.40.4.3up to date
 hex-literal^11.1.0up to date
 hmac^0.120.13.0out of date
 rpassword^77.5.2up to date
 rust-argon2^23.0.0out of date
 salsa20^0.100.11.0out of date
 secstr^0.50.5.1up to date
 serde^11.0.228up to date
 serde_json^11.0.149up to date
 sha1^0.100.11.0out of date
 sha2^0.100.11.0out of date
 thiserror^22.0.18up to date
 totp-lite^22.0.1up to date
 twofish^0.70.8.0out of date
 url^22.5.8up to date
 uuid^11.23.1up to date
 xml-rs^0.81.0.0out of date
 zeroize^11.8.2up to date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References