<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0138</id>
    <title>An update for perl-Net-CIDR-Lite is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2024-05-25 06:44:27"/>
    <updated date="2024-05-25 06:44:27"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-47154" id="CVE-2021-47154" title="CVE-2021-47154 Base Score: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. (CVE-2021-47154)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="perl-Net-CIDR-Lite">
        <name>HCE 2.0</name>
        <package arch="noarch" name="perl-Net-CIDR-Lite" version="0.21" release="24.hce2">
          <filename>perl-Net-CIDR-Lite-0.21-24.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
