Skip to content

fix(compliance): exempt RUSTSEC-2026-0049, bump bytes to 1.11.1#9044

Merged
abernix merged 2 commits into1.xfrom
abernix/fix/1.x-nightly-compliance-rustsec-2026-0049
Mar 23, 2026
Merged

fix(compliance): exempt RUSTSEC-2026-0049, bump bytes to 1.11.1#9044
abernix merged 2 commits into1.xfrom
abernix/fix/1.x-nightly-compliance-rustsec-2026-0049

Conversation

@abernix
Copy link
Copy Markdown
Member

@abernix abernix commented Mar 23, 2026

Fixes the 1.x nightly compliance check, which was failing on two advisories as of 2026-03-23.

Changes

RUSTSEC-2026-0049 — rustls-webpki CRL matching bug

rustls-webpki 0.101.x (used transitively via the rustls 0.21.x stack — fred, hyper-rustls, tonic, etc.) has a CRL distribution point matching bug where only the first distributionPoint is checked against each CRL's IssuingDistributionPoint.

The patched version (≥0.103.10) requires the rustls 0.23.x ecosystem — a migration out of scope for the 1.x LTS branch. Exploiting the bug requires a compromised trusted CA, and the router does not enable CRL revocation checking, so this code path is not reachable in practice.

This was resolved on dev incidentally via the rustls 0.23.x upgrade (bfbc625 / #7554 and subsequent commits).

RUSTSEC-2026-0007 — bytes integer overflow

Bumped bytes from 1.10.1 to 1.11.1 (the patched version). This was resolved on dev in 56b7ea8 / #8857.

Checklist

  • cargo xtask check-compliance passes locally via mise (cargo-deny 0.18.9)

abernix added 2 commits March 23, 2026 14:51
Fixes the 1.x nightly compliance check which was failing on two
advisories.

RUSTSEC-2026-0049 (rustls-webpki CRL matching bug): the patched version
(>=0.103.10) requires the rustls 0.23.x ecosystem — a migration out of
scope for the 1.x LTS branch.  The CRL matching bug requires a
compromised trusted CA to exploit, and the router does not enable CRL
revocation checking, so this code path is not reachable in practice.
On dev this was resolved incidentally via the rustls 0.23.x upgrade
(bfbc625, #7554 and subsequent commits).

RUSTSEC-2026-0007 (bytes integer overflow): bumped bytes from 1.10.1 to
1.11.1, which is the patched version.  On dev this was resolved in
56b7ea8 (#8857).
@apollo-librarian
Copy link
Copy Markdown
Contributor

apollo-librarian bot commented Mar 23, 2026

✅ Docs preview has no changes

The preview was not built because there were no changes.

Build ID: 5ef5b41d84929625e40b0538
Build Logs: View logs


✅ AI Style Review — No Changes Detected

No MDX files were changed in this pull request.

Review Log: View detailed log

This review is AI-generated. Please use common sense when accepting these suggestions, as they may not always be accurate or appropriate for your specific context.

@abernix abernix requested review from carodewig and glasser March 23, 2026 13:23
@abernix abernix merged commit b6d21d3 into 1.x Mar 23, 2026
14 checks passed
@abernix abernix deleted the abernix/fix/1.x-nightly-compliance-rustsec-2026-0049 branch March 23, 2026 13:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants