CVE-2021-29922 log

Source
Severity Medium
Remote Yes
Type Access restriction bypass
Description
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
Group Package Affected Fixed Severity Status Ticket
AVG-2263 rust 1.52.1-3 1.53.0-1 Medium Fixed
References
https://rustsec.org/advisories/CVE-2021-29922.html
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md
https://github.com/rust-lang/rust/issues/83648
https://github.com/rust-lang/rust/pull/83652
https://github.com/rust-lang/rust/commit/974192cd98b3efca8e5cd293f641f561e7487b30