[Bug 1961865] New: perl-Net-CIDR-Lite: Incorrect handling of IP
address with leading zeros in IP octets
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1961865
Bug ID: 1961865
Summary: perl-Net-CIDR-Lite: Incorrect handling of IP address
with leading zeros in IP octets
Product: Security Response
Hardware: All
OS: Linux
Status: NEW
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: security-response-team(a)redhat.com
Reporter: thoger(a)redhat.com
CC: paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org,
pzhukov(a)redhat.com, steve(a)silug.org
Target Milestone: ---
Classification: Other
It was discovered that the perl Net-CIDR-Lite module did not correctly handle
IP addresses with IP octets containing leading zeros. Leading zeros were
ignored, while the underlying system can treat such octets as octal numbers and
interpret them differently. For example, IP address of 010.0.0.1 was
considered by Net-CIDR-Lite to be the same address as 10.0.0.1, while system
may consider it to be IP address 8.0.0.1.
Reference:
https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distr...
This issue was fixed in Net-CIDR-Lite version 0.22 via this change:
https://metacpan.org/diff/file?target=STIGTSP/Net-CIDR-Lite-0.22/Lite.pm&...
An example of a potentially vulnerable use case can be found in the
SpamAssassin's URILocalBL plugin:
https://svn.apache.org/viewvc/spamassassin/tags/spamassassin_release_3_4_...
It allows checking URLs extracted from emails against locally defined blacklist
of IP ranges. IP addresses to check are typically obtained by resolving host
names used in URLs. However, URLs with IP addresses can be used directly.
Hence, this issue could potentially lead to a bypass of the defined blacklist.
Note that this plugin does not seem to be affected due to the use of a strict
regular expression used to determine if URL contains host name or IP address.
That regular expression does not consider addresses with leading zeros as valid
IP addresses and performs their resolution, translating the IP string to how
system interprets it.
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 6 months
[Bug 1994629] New: perl-libwww-perl-6.56 is available
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1994629
Bug ID: 1994629
Summary: perl-libwww-perl-6.56 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-libwww-perl
Keywords: FutureFeature, Triaged
Assignee: mspacek(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: caillon+fedoraproject(a)gmail.com, kasal(a)ucw.cz,
mspacek(a)redhat.com,
perl-devel(a)lists.fedoraproject.org,
rhughes(a)redhat.com, rstrode(a)redhat.com,
sandmann(a)redhat.com
Target Milestone: ---
Classification: Fedora
Latest upstream release: 6.56
Current version/release in rawhide: 6.55-2.fc35
URL: http://search.cpan.org/dist/libwww-perl/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://fedoraproject.org/wiki/Upstream_release_monitoring
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from anitya:
https://release-monitoring.org/project/3024/
--
You are receiving this mail because:
You are on the CC list for the bug.
2 years, 8 months