SUSE 5032 Published by

A perl-Net-Netmask security update has been released for SUSE Linux Enterprise 15 SP4.



openSUSE-SU-2023:0215-1: moderate: Security update for perl-Net-Netmask


openSUSE Security Update: Security update for perl-Net-Netmask
_______________________________

Announcement ID: openSUSE-SU-2023:0215-1
Rating: moderate
References: #1184425
Cross-References: CVE-2021-29424
CVSS scores:
CVE-2021-29424 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2021-29424 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:
openSUSE Backports SLE-15-SP4
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for perl-Net-Netmask fixes the following issues:

* CVE-2021-29424: Leading zeros are no longer allowed for IPv4 octets.
This (in some situations) allows attackers to bypass access control that
is based on IP addresses.(boo#1184425)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP4:

zypper in -t patch openSUSE-2023-215=1

Package List:

- openSUSE Backports SLE-15-SP4 (noarch):

perl-Net-Netmask-1.9022-bp154.2.3.1

References:

https://www.suse.com/security/cve/CVE-2021-29424.html
https://bugzilla.suse.com/1184425