SUSE 5181 Published by

A perl-Net-Netmask security update has been released for SUSE Linux Enterprise 15 SP5.



openSUSE-SU-2023:0217-1: moderate: Security update for perl-Net-Netmask


openSUSE Security Update: Security update for perl-Net-Netmask
_______________________________

Announcement ID: openSUSE-SU-2023:0217-1
Rating: moderate
References: #1184425
Cross-References: CVE-2021-29424
CVSS scores:
CVE-2021-29424 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2021-29424 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for perl-Net-Netmask fixes the following issues:

* CVE-2021-29424: Leading zeros are no longer allowed for IPv4 octets.
This (in some situations) allows attackers to bypass access control that
is based on IP addresses. (boo#1184425)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP5:

zypper in -t patch openSUSE-2023-217=1

Package List:

- openSUSE Backports SLE-15-SP5 (noarch):

perl-Net-Netmask-1.9022-bp155.3.3.1

References:

https://www.suse.com/security/cve/CVE-2021-29424.html
https://bugzilla.suse.com/1184425