diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2021-11-25 23:23:50 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2021-11-25 23:23:50 +0100 |
commit | fe1a20f9ad3e2484a96721b76132babf4e447639 (patch) | |
tree | 6b93dc8238e09f4eeba37cdffe6d595da13d79f7 /data/CVE/2020.list | |
parent | 64857c7aeb4a201d621346f902eb8f8d4ab2b272 (diff) |
mark CVE-2020-16154 as no-dsa for Stretch
Diffstat (limited to 'data/CVE/2020.list')
-rw-r--r-- | data/CVE/2020.list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 9d64d4c27b..13691b87de 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -33722,6 +33722,7 @@ CVE-2020-16155 [does not uniquely define signed data] - libcpan-checksums-perl <unfixed> [bullseye] - libcpan-checksums-perl <no-dsa> (Minor issue) [buster] - libcpan-checksums-perl <no-dsa> (Minor issue) + [stretch] - libcpan-checksums-perl <no-dsa> (Minor issue) NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html CVE-2020-16154 [Signature Verification Bypass] |