Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-29922

Опубликовано: 07 авг. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4
CVSS3: 9.1

Описание

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

DNE

esm-apps/bionic

not-affected

1.53.0+dfsg1+llvm-4ubuntu1~18.04.1
esm-apps/focal

released

1.53.0+dfsg1+llvm-4ubuntu1~20.04.1
esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

focal

released

1.53.0+dfsg1+llvm-4ubuntu1~20.04.1
groovy

ignored

end of life
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

EPSS

Процентиль: 39%
0.00175
Низкий

6.4 Medium

CVSS2

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.3
redhat
больше 4 лет назад

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.

CVSS3: 9.1
nvd
больше 4 лет назад

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.

CVSS3: 9.1
debian
больше 4 лет назад

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly ...

rocky
около 4 лет назад

Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update

CVSS3: 9.1
github
больше 3 лет назад

library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.

EPSS

Процентиль: 39%
0.00175
Низкий

6.4 Medium

CVSS2

9.1 Critical

CVSS3