OESA-2024-1305

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1305
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1305.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2024-1305
Upstream
Published
2024-03-22T11:07:15Z
Modified
2025-09-03T06:17:48.338740Z
Summary
perl-Net-CIDR-Lite security update
Details

Faster alternative to Net::CIDR when merging a large number of CIDR address ranges. Works for IPv4 and IPv6 addresses.

Security Fix(es):

The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.(CVE-2021-47154)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS / perl-Net-CIDR-Lite

Package

Name
perl-Net-CIDR-Lite
Purl
pkg:rpm/openEuler/perl-Net-CIDR-Lite&distro=openEuler-22.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.21-24.oe2203

Ecosystem specific

{
    "noarch": [
        "perl-Net-CIDR-Lite-0.21-24.oe2203.noarch.rpm",
        "perl-Net-CIDR-Lite-help-0.21-24.oe2203.noarch.rpm"
    ],
    "src": [
        "perl-Net-CIDR-Lite-0.21-24.oe2203.src.rpm"
    ]
}