Resolve RUSTSEC-2026-0049 rustls-webpki CRL matching vulnerability#56
Conversation
|
Important Review skippedReview was skipped due to path filters ⛔ Files ignored due to path filters (1)
CodeRabbit blocks several paths by default. You can override this behavior by explicitly including those paths in the path filters. For example, including ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Summary
rustls-webpkifrom 0.103.9 to 0.103.10 to resolve RUSTSEC-2026-0049 (faulty CRL Distribution Point matching)quinn-protoDoS) was already resolved in Resolve unauthenticated remote DoS in quinn-proto QUIC parsing #54Only
Cargo.lockis modified; no source changes. The patched version is within semver-compatible range, pulled viacargo update rustls-webpki@0.103.9.Verification
cargo auditconfirms neither RUSTSEC-2026-0037 nor RUSTSEC-2026-0049 appearcargo clippy --workspace -- -D warningspasses cleancargo fmt --checkpasses