First published: Sat Aug 07 2021(Updated: )
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rust-lang Rust | <1.53.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29922 is a vulnerability in Rust that allows attackers to bypass access control based on IP addresses.
CVE-2021-29922 has a severity rating of 9.1 (critical).
CVE-2021-29922 occurs due to Rust not properly considering extraneous zero characters at the beginning of an IP address string, leading to unexpected octal interpretation and potential bypass of IP-based access control.
Rust versions before 1.53.0 are affected by CVE-2021-29922.
To fix CVE-2021-29922, update Rust to version 1.53.0 or later.