[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3770-1] libnet-cidr-lite-perl security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3770-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
March 23, 2024                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libnet-cidr-lite-perl
Version        : 0.21-2+debu10u1
CVE ID         : CVE-2021-47154


An issue has been found in libnet-cidr-lite-perl, a module for merging IPv4 or IPv6 CIDR address ranges.

Extraneous zero characters at the beginning of an IP address string
might allow attackers to bypass access control that is based on IP addresses.

Please check your application whether it accidentally allows such leading zero characters (that are normally meant to indicate octal numbers).


For Debian 10 buster, this problem has been fixed in version
0.21-2+debu10u1.

We recommend that you upgrade your libnet-cidr-lite-perl packages.

For the detailed security status of libnet-cidr-lite-perl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libnet-cidr-lite-perl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAmX/AoJfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy
MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcACgkQlvysDTh7
WEeS0w//X6qyxaGb0ZhA+WYIaIDfs+WXjnR5MR0tAy8wubXm+Wq1CJrbRcxLhCpr
Lg0Q3OoGqR8pWt0a5/f1Z2DtowmWspwvnwdV3E23mER0xjOLYmQhpjRrHbDy+s4z
n5qp2pmJhstyepXV17ElkKghHLzQDb7ZYbOAl/YhbP1kkVTcqxetM5TOKpyEn+dL
8NQnErFsQ6cyOuqbdf3i1lwpA1NjNKa3LwLPou6u6X6oBqxAI1otHbkpsJglGNgS
E5m3ZWZCym984/C88gO3zXMmNEbfrEoypy+hTVtoXNCtOh9yX1D0VLwiVpnLKUT2
X1UoiH9Sxzx0K5WbclbsEkL++HmXEgHrhMXyAkv80aEDvdIzgGGO3OrlOUmVFRwq
jeyP+XtAozveufK+BDRIYAArZzyNOROWJ3IK1xL5EbXUJs60Y3oh3W/9E0Hs4SGR
O51XS47LiSzPMf6yJ2eShpLJ+BLg1VDYIAtcsjcKWPlJsSvAaG2JPJf4Xn+Nwvs2
yYKeCEkGXif/7xPfftvaHce0p8Av7Zi1MJ/myK7E6PcdIPouZuJhRsZZ3CDoDQHm
KdmaVr05rQxUlMQoKGgYmnwxRo0dtfk73p1xHEBoX69mwqxHQMP8MVO/XDWfCs7k
xN7IFnOH74nS10VkBigxoC2WzhyuAR0e/uP6m/Bu+GOuMaA9S6s=
=kE+i
-----END PGP SIGNATURE-----


Reply to: