Skip to content

dep: update rumqttd/rumqttc to resolve RUSTSEC-2026-0049 (rustls-webpki) #2

@ben-miru

Description

@ben-miru

Context

cargo audit fails due to RUSTSEC-2026-0049 — a CRL matching logic bug in rustls-webpki <0.103.10.

Both rumqttd 0.20.0 and rumqttc 0.25.1 (the latest on crates.io) depend on rustls 0.22 / rustls-webpki 0.102.x, so we can't resolve this with a simple cargo update.

Impact

None for us. The vulnerability is in CRL (Certificate Revocation List) matching logic, which is opt-in. Our MQTT client uses Transport::Tls(Default::default()) with no custom CRL configuration, so the faulty code path is never hit.

Upstream

Current workaround

Advisory is suppressed in .cargo/audit.toml. Remove the ignore entry once upstream publishes a fixed version.

Action items

  • Watch for a new rumqttd / rumqttc release with rustls-webpki >=0.103.10
  • Update Cargo.toml workspace deps
  • Remove the RUSTSEC-2026-0049 ignore from .cargo/audit.toml

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions