CVE-2021-29922

EUVD-2021-16396
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 55%
Affected Products (NVD)
VendorProductVersion
rust-langrust
𝑥
< 1.53.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rustc
bookworm
1.63.0+dfsg1-2
fixed
bullseye
no-dsa
buster
no-dsa
sid
1.82.0+dfsg1-2
fixed
stretch
ignored
trixie
1.82.0+dfsg1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rustc
bionic
not-affected
focal
Fixed 1.53.0+dfsg1+llvm-4ubuntu1~20.04.1
released
groovy
ignored
hirsute
ignored
impish
ignored
jammy
Fixed 1.53.0+dfsg1+llvm-4ubuntu1
released
kinetic
ignored
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
needed
xenial
needed