CVE-2026-45190

NameCVE-2026-45190
DescriptionNet::CIDR::Lite versions before 0.24 for Perl does not properly validate IP address and CIDR mask inputs, which may allow IP ACL bypass. Inputs containing a trailing newline or non-ASCII digit characters pass the validators but are then re-encoded by the parser to a different address than the input string spelled. find() and bin_find() can match or miss addresses as a result. Example: my $cidr = Net::CIDR::Lite->new(); $cidr->add("::1\n/128"); $cidr->find("::1a"); # incorrectly returns true See also CVE-2026-45191.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnet-cidr-lite-perl (PTS)bullseye0.22-1vulnerable
bookworm, trixie0.22-2vulnerable
forky0.22-3vulnerable
sid0.24-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnet-cidr-lite-perlsource(unstable)0.24-1

Notes

https://github.com/stigtsp/Net-CIDR-Lite/commit/ca9542adec87110556601d7ce48381ea8d13e692 (0.24)
https://www.openwall.com/lists/oss-security/2026/05/10/6
https://lists.security.metacpan.org/cve-announce/msg/39920372/

Search for package or bug name: Reporting problems