CVE-2021-29922 - log back

CVE-2021-29922 edited at 09 Aug 2021 07:41:27
References
+ https://rustsec.org/advisories/CVE-2021-29922.html
https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md
https://github.com/rust-lang/rust/issues/83648
https://github.com/rust-lang/rust/pull/83652
https://github.com/rust-lang/rust/commit/974192cd98b3efca8e5cd293f641f561e7487b30
CVE-2021-29922 edited at 08 Aug 2021 07:55:30
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Access restriction bypass
Description
+ library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
References
+ https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-015.md
+ https://github.com/rust-lang/rust/issues/83648
+ https://github.com/rust-lang/rust/pull/83652
+ https://github.com/rust-lang/rust/commit/974192cd98b3efca8e5cd293f641f561e7487b30
Notes
CVE-2021-29922 created at 08 Aug 2021 07:51:22