summaryrefslogtreecommitdiffstats
path: root/data/CVE/2020.list
diff options
context:
space:
mode:
authorThorsten Alteholz <debian@alteholz.de>2021-11-25 23:25:10 +0100
committerThorsten Alteholz <debian@alteholz.de>2021-11-25 23:25:10 +0100
commit4ada1c7816fdbcbc6272b3879d480f678c0a5f71 (patch)
treea049e6e124161c647ec39e7d86715e89faf6d475 /data/CVE/2020.list
parentfe1a20f9ad3e2484a96721b76132babf4e447639 (diff)
mark CVE-2020-16154 as no-dsa for Stretch
Diffstat (limited to 'data/CVE/2020.list')
-rw-r--r--data/CVE/2020.list1
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list
index 13691b87de..7801e39ed4 100644
--- a/data/CVE/2020.list
+++ b/data/CVE/2020.list
@@ -33730,6 +33730,7 @@ CVE-2020-16154 [Signature Verification Bypass]
- cpanminus <unfixed>
[bullseye] - cpanminus <no-dsa> (Minor issue)
[buster] - cpanminus <no-dsa> (Minor issue)
+ [stretch] - cpanminus <no-dsa> (Minor issue)
NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
CVE-2020-16153

© 2014-2024 Faster IT GmbH | imprint | privacy policy