{"id":"MGASA-2026-0136","summary":"Updated perl-Net-CIDR-Lite packages fix security vulnerabilities","details":"Net::CIDR::Lite versions before 0.24 for Perl does not properly validate\nIP address and CIDR mask inputs, which may allow IP ACL bypass.\n(CVE-2026-45190)\nNet::CIDR::Lite versions before 0.24 for Perl does not properly consider\nextraneous zero characters in CIDR mask values, which may allow IP ACL\nbypass. (CVE-2026-45191)\n","modified":"2026-05-14T02:45:13.411461Z","published":"2026-05-14T02:43:25Z","upstream":["CVE-2026-45190","CVE-2026-45191"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2026-0136.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=35506"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2026/05/10/6"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2026/05/10/7"}],"affected":[{"package":{"name":"perl-Net-CIDR-Lite","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/perl-Net-CIDR-Lite?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.240.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0136.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}