{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2021-47155","title":"Title"},{"category":"description","text":"The Net::IPV4Addr module 0.10 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2021-47155","url":"https://www.suse.com/security/cve/CVE-2021-47155"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1221565 for CVE-2021-47155","url":"https://bugzilla.suse.com/1221565"}],"title":"SUSE CVE CVE-2021-47155","tracking":{"current_release_date":"2025-02-17T04:56:33Z","generator":{"date":"2024-03-19T03:50:21Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2021-47155","initial_release_date":"2024-03-19T03:50:21Z","revision_history":[{"date":"2024-03-19T03:50:21Z","number":"2","summary":"Current version"},{"date":"2024-12-03T01:25:35Z","number":"3","summary":"Current version"},{"date":"2025-02-15T04:33:54Z","number":"4","summary":"Current version"},{"date":"2025-02-17T04:56:33Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}