CVE-2026-45191

NameCVE-2026-45191
DescriptionNet::CIDR::Lite versions before 0.24 for Perl does not properly consider extraneous zero characters in CIDR mask values, which may allow IP ACL bypass. Mask forms like "/00" and "/01" pass validation and parse to the same prefix as their unpadded value. See also CVE-2026-45190.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libnet-cidr-lite-perl (PTS)bullseye0.22-1vulnerable
bookworm, trixie0.22-2vulnerable
forky0.22-3vulnerable
sid0.24-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libnet-cidr-lite-perlsource(unstable)0.24-1

Notes

https://github.com/stigtsp/Net-CIDR-Lite/commit/24e2c439ec405e5256024b9acefd4f7008c5ed0c (0.24)
https://www.openwall.com/lists/oss-security/2026/05/10/7
https://lists.security.metacpan.org/cve-announce/msg/39920370/

Search for package or bug name: Reporting problems