An update for rust is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1323 Final 1.0 1.0 2021-08-23 Initial 2021-08-23 2021-08-23 openEuler SA Tool V1.0 2021-08-23 rust security update An update for rust is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. Security Fix(es): library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.(CVE-2021-29922) An update for rust is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Critical rust https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1323 https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-29922 https://nvd.nist.gov/vuln/detail/CVE-2021-29922 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 rust-debuginfo-1.51.0-5.oe1.aarch64.rpm rust-help-1.51.0-5.oe1.aarch64.rpm cargo-1.51.0-5.oe1.aarch64.rpm rust-1.51.0-5.oe1.aarch64.rpm rust-debugsource-1.51.0-5.oe1.aarch64.rpm rust-std-static-1.51.0-5.oe1.aarch64.rpm clippy-1.51.0-5.oe1.aarch64.rpm rls-1.51.0-5.oe1.aarch64.rpm rust-analysis-1.51.0-5.oe1.aarch64.rpm rustfmt-1.51.0-5.oe1.aarch64.rpm rust-debuginfo-1.51.0-5.oe1.aarch64.rpm rust-help-1.51.0-5.oe1.aarch64.rpm cargo-1.51.0-5.oe1.aarch64.rpm rust-1.51.0-5.oe1.aarch64.rpm rust-debugsource-1.51.0-5.oe1.aarch64.rpm rust-std-static-1.51.0-5.oe1.aarch64.rpm clippy-1.51.0-5.oe1.aarch64.rpm rls-1.51.0-5.oe1.aarch64.rpm rust-analysis-1.51.0-5.oe1.aarch64.rpm rustfmt-1.51.0-5.oe1.aarch64.rpm rust-debugger-common-1.51.0-5.oe1.noarch.rpm rust-lldb-1.51.0-5.oe1.noarch.rpm rust-src-1.51.0-5.oe1.noarch.rpm rust-gdb-1.51.0-5.oe1.noarch.rpm rust-debugger-common-1.51.0-5.oe1.noarch.rpm rust-lldb-1.51.0-5.oe1.noarch.rpm rust-src-1.51.0-5.oe1.noarch.rpm rust-gdb-1.51.0-5.oe1.noarch.rpm rust-1.51.0-5.oe1.src.rpm rust-1.51.0-5.oe1.src.rpm cargo-1.51.0-5.oe1.x86_64.rpm clippy-1.51.0-5.oe1.x86_64.rpm rust-std-static-1.51.0-5.oe1.x86_64.rpm rustfmt-1.51.0-5.oe1.x86_64.rpm rust-debugsource-1.51.0-5.oe1.x86_64.rpm rust-analysis-1.51.0-5.oe1.x86_64.rpm rust-help-1.51.0-5.oe1.x86_64.rpm rust-debuginfo-1.51.0-5.oe1.x86_64.rpm rls-1.51.0-5.oe1.x86_64.rpm rust-1.51.0-5.oe1.x86_64.rpm cargo-1.51.0-5.oe1.x86_64.rpm clippy-1.51.0-5.oe1.x86_64.rpm rust-std-static-1.51.0-5.oe1.x86_64.rpm rustfmt-1.51.0-5.oe1.x86_64.rpm rust-debugsource-1.51.0-5.oe1.x86_64.rpm rust-analysis-1.51.0-5.oe1.x86_64.rpm rust-help-1.51.0-5.oe1.x86_64.rpm rust-debuginfo-1.51.0-5.oe1.x86_64.rpm rls-1.51.0-5.oe1.x86_64.rpm rust-1.51.0-5.oe1.x86_64.rpm library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. 2021-08-23 CVE-2021-29922 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 Critical 9.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H rust security update 2021-08-23 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1323