fix(security): update vulnerable dependencies, clean up deny.toml

Cargo.lock updates (cargo update):
- tar 0.4.44 -> 0.4.45 (RUSTSEC-2026-0067, RUSTSEC-2026-0068)
- rustls-webpki 0.103.9 -> 0.103.11 (RUSTSEC-2026-0049)
- tracing-subscriber 0.3.22 -> 0.3.23
- yamux 0.13.8 -> 0.13.10 (RUSTSEC-2024-0428 for 0.13.x branch)

deny.toml: remove fixed advisory ignores, add accurate tracking comments

Remaining known issues (cannot fix without toolchain/vendor upgrade):
- wasmtime 37.x: fix in 42.x requires rustc 1.91 (pinned to 1.88)
- yamux 0.12.1: locked by libp2p-yamux 0.47.0 in zombienet vendor
This commit is contained in:
2026-04-14 00:15:21 +03:00
parent a683b836fe
commit 787efa3cce
2 changed files with 52 additions and 55 deletions
+12 -15
View File
@@ -20,29 +20,26 @@ yanked = "warn"
# Track via quarterly review instead of blocking CI.
unmaintained = "none"
ignore = [
# wasmtime 37.0.3: no patch release for 37.x branch. Upgrade to 41+ requires
# major API changes in pezsc-executor-wasmtime. Tracked for future major upgrade.
# wasmtime 37.0.3: fix requires 42.0.2 but cranelift-assembler-x64 0.129+ needs
# rustc 1.91.0 — our toolchain is pinned to 1.88.0. Unblock by upgrading toolchain.
# Note: we do NOT use Winch backend or Component Model, so sandbox-escape CVEs
# (Winch/aarch64) and string-transcoding CVEs (Component Model) do not apply.
# Remaining real risk: pooling allocator data leakage (RUSTSEC-2026-0006).
"RUSTSEC-2026-0006", # wasmtime segfault with f64.copysign on x86-64
"RUSTSEC-2026-0020", # wasmtime guest-controlled resource exhaustion
"RUSTSEC-2026-0020", # wasmtime WASI guest-controlled resource exhaustion
"RUSTSEC-2026-0021", # wasmtime panic in wasi:http/types.fields
# rustls-webpki 0.101.7 & 0.103.9: pulled transitively by kube (0.87.2) and
# jsonrpsee (0.24.10). Fix requires >=0.103.10 but upstream hasn't released
# compatible versions of kube/jsonrpsee yet.
"RUSTSEC-2026-0049", # rustls-webpki certificate path building panic
# rsa 0.9.10: Marvin Attack timing sidechannel. Pulled transitively by
# sqlx-mysql (pezpallet-revive-eth-rpc). Not used for cryptographic signing.
"RUSTSEC-2023-0071", # rsa Marvin Attack
# tracing-subscriber 0.2.25: ANSI log poisoning. Pulled by ark-relations 0.5.1.
# Upstream arkworks hasn't updated to tracing-subscriber 0.3.x yet.
"RUSTSEC-2025-0055", # tracing-subscriber ANSI escape
# tracing-subscriber 0.2.25: ANSI log injection. Pulled by ark-relations 0.5.1.
# Our 0.3.x is updated to 0.3.23 (fixed). 0.2.x used only by arkworks internals.
"RUSTSEC-2025-0055", # tracing-subscriber ANSI escape (0.2.x, arkworks transitive)
# tar 0.4.44: link following + path traversal. Pulled transitively.
# No patch available for 0.4.x branch yet.
"RUSTSEC-2026-0067", # tar symlink path traversal
"RUSTSEC-2026-0068", # tar link following vulnerability
# yamux 0.12.1: libp2p-yamux 0.47.0 (vendor/pezkuwi-zombienet-sdk) pins to 0.12.x.
# Fix requires 0.13.10. Upgrade path: update libp2p in zombienet vendor.
"RUSTSEC-2024-0428", # yamux remote panic via malformed Data frame (< 0.13.10)
]
# License compliance