{"id":"MGASA-2021-0375","summary":"Updated perl-Net-Netmask package fixes a security vulnerability","details":"The Net::Netmask module before 2.0000 for Perl does not properly consider\nextraneous zero characters at the beginning of an IP address string, which\n(in some situations) allows attackers to bypass access control that is based\non IP addresses (CVE-2021-29424).\n","modified":"2026-02-04T03:14:41.291273Z","published":"2021-07-27T20:21:53Z","related":["CVE-2021-29424"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0375.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29023"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CBJVLXJSWN6DKSF5ADUEERI6M23R3GGP/"}],"affected":[{"package":{"name":"perl-Net-Netmask","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/perl-Net-Netmask?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.100-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0375.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}