diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2021-11-25 23:25:43 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2021-11-25 23:25:43 +0100 |
commit | e2c20f03287bac1e0f47a2197a089ab3debf5f3a (patch) | |
tree | d9b6e2526715e3799c764682c8ed831287306f26 | |
parent | 1402fae2124e8e8a60ab97f7edd0b625796aa8e2 (diff) |
mark CVE-2020-16156 as no-dsa for Stretch
-rw-r--r-- | data/CVE/list.2020 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020 index 7801e39ed4..db8ddc02cd 100644 --- a/data/CVE/list.2020 +++ b/data/CVE/list.2020 @@ -33715,6 +33715,7 @@ CVE-2020-16156 [Signature Verification Bypass] - perl <unfixed> [bullseye] - perl <no-dsa> (Minor issue) [buster] - perl <no-dsa> (Minor issue) + [stretch] - perl <no-dsa> (Minor issue) NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html CVE-2020-16155 [does not uniquely define signed data] |