1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
[]
= 2
= [
# rsa: timing sidechannel (no fix available). Purple only uses it for GCP
# JWT signing, not for private key operations over a network.
"RUSTSEC-2023-0071",
# time: DoS via stack exhaustion in RFC 2822 parsing. Fix requires Rust
# 1.88 but our MSRV is 1.86. Purple does not parse user-provided RFC 2822
# input. Revisit when MSRV is raised.
"RUSTSEC-2026-0009",
# paste: unmaintained, no security vulnerability. Pulled transitively by
# netlink-packet-utils (the rust-netlink ecosystem) for the Linux tunnel
# throughput sampler. Revisit when netlink-packet-utils migrates to
# `pastey` or drops the proc-macro dep.
"RUSTSEC-2024-0436",
]
[]
= 2
= [
"MIT",
"Apache-2.0",
"BSD-2-Clause",
"BSD-3-Clause",
"ISC",
"MPL-2.0",
"Unicode-3.0",
"CDLA-Permissive-2.0",
"Zlib",
]
= 0.8
[]
= "warn"
[]
= "deny"
= "deny"