The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
References
Link | Resource |
---|---|
https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBJVLXJSWN6DKSF5ADUEERI6M23R3GGP/ | Mailing List Third Party Advisory |
https://metacpan.org/changes/distribution/Net-Netmask#L11-22 | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7JIPQAY5OZ5D3DA7INQILU7SGHTHMWB/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JF4CYIZELC3NISB3RMV4OCI4GYBC557B/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210604-0007/ | Third Party Advisory |
Information
Published : 2021-04-06 09:15
Updated : 2021-06-08 06:52
NVD link : CVE-2021-29424
Mitre link : CVE-2021-29424
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
fedoraproject
- fedora
net\
- \