OESA-2024-1303

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1303
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1303.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2024-1303
Upstream
Published
2024-03-22T11:07:15Z
Modified
2025-09-03T06:17:48.217899Z
Summary
perl-Net-CIDR-Lite security update
Details

Faster alternative to Net::CIDR when merging a large number of CIDR address ranges. Works for IPv4 and IPv6 addresses.

Security Fix(es):

The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.(CVE-2021-47154)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / perl-Net-CIDR-Lite

Package

Name
perl-Net-CIDR-Lite
Purl
pkg:rpm/openEuler/perl-Net-CIDR-Lite&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.21-24.oe1

Ecosystem specific

{
    "noarch": [
        "perl-Net-CIDR-Lite-help-0.21-24.oe1.noarch.rpm",
        "perl-Net-CIDR-Lite-0.21-24.oe1.noarch.rpm"
    ],
    "src": [
        "perl-Net-CIDR-Lite-0.21-24.oe1.src.rpm"
    ]
}