Improper Validation of Specified Type of Input Affecting perl-Archive-Extract package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL6-PERLARCHIVEEXTRACT-16761141
  • published19 May 2026
  • disclosed10 May 2026

Introduced: 10 May 2026

NewCVE-2026-45190  (opens in a new tab)
CWE-1287  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:6 perl-Archive-Extract.

NVD Description

Note: Versions mentioned in the description apply only to the upstream perl-Archive-Extract package and not the perl-Archive-Extract package as distributed by RHEL. See How to fix? for RHEL:6 relevant fixed versions and status.

Net::CIDR::Lite versions before 0.24 for Perl does not properly validate IP address and CIDR mask inputs, which may allow IP ACL bypass.

Inputs containing a trailing newline or non-ASCII digit characters pass the validators but are then re-encoded by the parser to a different address than the input string spelled. find() and bin_find() can match or miss addresses as a result.

Example:

my $cidr = Net::CIDR::Lite->new(); $cidr->add("::1\n/128"); $cidr->find("::1a"); # incorrectly returns true

See also CVE-2026-45191.

CVSS Base Scores

version 3.1