An update for rust is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1323
Final
1.0
1.0
2021-08-23
Initial
2021-08-23
2021-08-23
openEuler SA Tool V1.0
2021-08-23
rust security update
An update for rust is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.
Security Fix(es):
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.(CVE-2021-29922)
An update for rust is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
rust
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1323
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-29922
https://nvd.nist.gov/vuln/detail/CVE-2021-29922
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
rust-debuginfo-1.51.0-5.oe1.aarch64.rpm
rust-help-1.51.0-5.oe1.aarch64.rpm
cargo-1.51.0-5.oe1.aarch64.rpm
rust-1.51.0-5.oe1.aarch64.rpm
rust-debugsource-1.51.0-5.oe1.aarch64.rpm
rust-std-static-1.51.0-5.oe1.aarch64.rpm
clippy-1.51.0-5.oe1.aarch64.rpm
rls-1.51.0-5.oe1.aarch64.rpm
rust-analysis-1.51.0-5.oe1.aarch64.rpm
rustfmt-1.51.0-5.oe1.aarch64.rpm
rust-debuginfo-1.51.0-5.oe1.aarch64.rpm
rust-help-1.51.0-5.oe1.aarch64.rpm
cargo-1.51.0-5.oe1.aarch64.rpm
rust-1.51.0-5.oe1.aarch64.rpm
rust-debugsource-1.51.0-5.oe1.aarch64.rpm
rust-std-static-1.51.0-5.oe1.aarch64.rpm
clippy-1.51.0-5.oe1.aarch64.rpm
rls-1.51.0-5.oe1.aarch64.rpm
rust-analysis-1.51.0-5.oe1.aarch64.rpm
rustfmt-1.51.0-5.oe1.aarch64.rpm
rust-debugger-common-1.51.0-5.oe1.noarch.rpm
rust-lldb-1.51.0-5.oe1.noarch.rpm
rust-src-1.51.0-5.oe1.noarch.rpm
rust-gdb-1.51.0-5.oe1.noarch.rpm
rust-debugger-common-1.51.0-5.oe1.noarch.rpm
rust-lldb-1.51.0-5.oe1.noarch.rpm
rust-src-1.51.0-5.oe1.noarch.rpm
rust-gdb-1.51.0-5.oe1.noarch.rpm
rust-1.51.0-5.oe1.src.rpm
rust-1.51.0-5.oe1.src.rpm
cargo-1.51.0-5.oe1.x86_64.rpm
clippy-1.51.0-5.oe1.x86_64.rpm
rust-std-static-1.51.0-5.oe1.x86_64.rpm
rustfmt-1.51.0-5.oe1.x86_64.rpm
rust-debugsource-1.51.0-5.oe1.x86_64.rpm
rust-analysis-1.51.0-5.oe1.x86_64.rpm
rust-help-1.51.0-5.oe1.x86_64.rpm
rust-debuginfo-1.51.0-5.oe1.x86_64.rpm
rls-1.51.0-5.oe1.x86_64.rpm
rust-1.51.0-5.oe1.x86_64.rpm
cargo-1.51.0-5.oe1.x86_64.rpm
clippy-1.51.0-5.oe1.x86_64.rpm
rust-std-static-1.51.0-5.oe1.x86_64.rpm
rustfmt-1.51.0-5.oe1.x86_64.rpm
rust-debugsource-1.51.0-5.oe1.x86_64.rpm
rust-analysis-1.51.0-5.oe1.x86_64.rpm
rust-help-1.51.0-5.oe1.x86_64.rpm
rust-debuginfo-1.51.0-5.oe1.x86_64.rpm
rls-1.51.0-5.oe1.x86_64.rpm
rust-1.51.0-5.oe1.x86_64.rpm
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
2021-08-23
CVE-2021-29922
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
Critical
9.1
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
rust security update
2021-08-23
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1323