You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RustSec reports all versions of ring before 0.17.12 as vulnerable to https://rustsec.org/advisories/RUSTSEC-2025-0009. Though this particular issue may not be critical (and it's unclear whether 0.16 is really affected), the author has stated "Nobody should be using 0.16.20 any longer." (link)
It seems pretty clear that ring 0.16 is unmaintained, which is a bad property for a cryptography library. There haven't been any 0.16 releases since 2021.
octorust depends on ring 0.16 both as a direct dependency, and transitively via jsonwebtoken 8.x.
The text was updated successfully, but these errors were encountered:
RustSec reports all versions of
ring
before0.17.12
as vulnerable to https://rustsec.org/advisories/RUSTSEC-2025-0009. Though this particular issue may not be critical (and it's unclear whether 0.16 is really affected), the author has stated "Nobody should be using 0.16.20 any longer." (link)It seems pretty clear that
ring
0.16 is unmaintained, which is a bad property for a cryptography library. There haven't been any 0.16 releases since 2021.octorust depends on
ring 0.16
both as a direct dependency, and transitively viajsonwebtoken 8.x
.The text was updated successfully, but these errors were encountered: