summaryrefslogtreecommitdiffstats
path: root/data/CVE/2020.list
diff options
context:
space:
mode:
authorThorsten Alteholz <debian@alteholz.de>2021-11-25 23:23:50 +0100
committerThorsten Alteholz <debian@alteholz.de>2021-11-25 23:23:50 +0100
commitfe1a20f9ad3e2484a96721b76132babf4e447639 (patch)
tree6b93dc8238e09f4eeba37cdffe6d595da13d79f7 /data/CVE/2020.list
parent64857c7aeb4a201d621346f902eb8f8d4ab2b272 (diff)
mark CVE-2020-16154 as no-dsa for Stretch
Diffstat (limited to 'data/CVE/2020.list')
-rw-r--r--data/CVE/2020.list1
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list
index 9d64d4c27b..13691b87de 100644
--- a/data/CVE/2020.list
+++ b/data/CVE/2020.list
@@ -33722,6 +33722,7 @@ CVE-2020-16155 [does not uniquely define signed data]
- libcpan-checksums-perl <unfixed>
[bullseye] - libcpan-checksums-perl <no-dsa> (Minor issue)
[buster] - libcpan-checksums-perl <no-dsa> (Minor issue)
+ [stretch] - libcpan-checksums-perl <no-dsa> (Minor issue)
NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
CVE-2020-16154 [Signature Verification Bypass]

© 2014-2024 Faster IT GmbH | imprint | privacy policy