OESA-2024-1304

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1304
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1304.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2024-1304
Upstream
Published
2024-03-22T11:07:15Z
Modified
2025-09-03T06:17:48.277834Z
Summary
perl-Net-CIDR-Lite security update
Details

Faster alternative to Net::CIDR when merging a large number of CIDR address ranges. Works for IPv4 and IPv6 addresses.

Security Fix(es):

The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.(CVE-2021-47154)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / perl-Net-CIDR-Lite

Package

Name
perl-Net-CIDR-Lite
Purl
pkg:rpm/openEuler/perl-Net-CIDR-Lite&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.21-24.oe2003sp4

Ecosystem specific

{
    "noarch": [
        "perl-Net-CIDR-Lite-0.21-24.oe2003sp4.noarch.rpm",
        "perl-Net-CIDR-Lite-help-0.21-24.oe2003sp4.noarch.rpm"
    ],
    "src": [
        "perl-Net-CIDR-Lite-0.21-24.oe2003sp4.src.rpm"
    ]
}