Bug 2443386 - CVE-2021-4456 perl-Net-CIDR: mishandling of leading zeros in IP CIDR addresses [epel-all]
Summary: CVE-2021-4456 perl-Net-CIDR: mishandling of leading zeros in IP CIDR addresse...
Keywords:
Status: ON_QA
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: perl-Net-CIDR
Version: epel10
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Paul Howarth
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["c6d84d3b-1372-4c25-b358-a...
Depends On:
Blocks: CVE-2021-4456
TreeView+ depends on / blocked
 
Reported: 2026-02-27 18:40 UTC by Guilherme de Almeida Suckevicz
Modified: 2026-03-02 01:25 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2026-02-27 18:40:53 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Fedora Update System 2026-03-01 13:44:23 UTC
FEDORA-EPEL-2026-36a72373e7 (perl-Net-CIDR-0.27-1.el10_2) has been submitted as an update to Fedora EPEL 10.2.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-36a72373e7

Comment 2 Fedora Update System 2026-03-01 13:44:26 UTC
FEDORA-EPEL-2026-c2d409a4ce (perl-Net-CIDR-0.27-1.el10_1) has been submitted as an update to Fedora EPEL 10.1.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-c2d409a4ce

Comment 3 Fedora Update System 2026-03-01 13:44:29 UTC
FEDORA-EPEL-2026-39c5d63f42 (perl-Net-CIDR-0.27-1.el8) has been submitted as an update to Fedora EPEL 8.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-39c5d63f42

Comment 4 Fedora Update System 2026-03-01 13:44:31 UTC
FEDORA-EPEL-2026-19279ff82c (perl-Net-CIDR-0.27-1.el9) has been submitted as an update to Fedora EPEL 9.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-19279ff82c

Comment 5 Fedora Update System 2026-03-01 13:44:34 UTC
FEDORA-EPEL-2026-32a3851c80 (perl-Net-CIDR-0.27-1.el10_3) has been submitted as an update to Fedora EPEL 10.3.
https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-32a3851c80

Comment 6 Fedora Update System 2026-03-02 00:45:14 UTC
FEDORA-EPEL-2026-36a72373e7 has been pushed to the Fedora EPEL 10.2 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-36a72373e7

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 7 Fedora Update System 2026-03-02 01:06:08 UTC
FEDORA-EPEL-2026-32a3851c80 has been pushed to the Fedora EPEL 10.3 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-32a3851c80

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 8 Fedora Update System 2026-03-02 01:11:39 UTC
FEDORA-EPEL-2026-c2d409a4ce has been pushed to the Fedora EPEL 10.1 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-c2d409a4ce

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 9 Fedora Update System 2026-03-02 01:17:35 UTC
FEDORA-EPEL-2026-19279ff82c has been pushed to the Fedora EPEL 9 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-19279ff82c

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 10 Fedora Update System 2026-03-02 01:25:49 UTC
FEDORA-EPEL-2026-39c5d63f42 has been pushed to the Fedora EPEL 8 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-39c5d63f42

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.


Note You need to log in before you can comment on or make changes to this bug.