diff options
author | Thorsten Alteholz <debian@alteholz.de> | 2021-11-25 23:25:43 +0100 |
---|---|---|
committer | Thorsten Alteholz <debian@alteholz.de> | 2021-11-25 23:25:43 +0100 |
commit | dc8897ab2595b8d93dc9ab8a02cedda6e92e8102 (patch) | |
tree | d8d7903e0c76b5c606446b9c7938a9e98555df23 | |
parent | 4ada1c7816fdbcbc6272b3879d480f678c0a5f71 (diff) |
mark CVE-2020-16156 as no-dsa for Stretch
-rw-r--r-- | data/CVE/2020.list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 7801e39ed4..db8ddc02cd 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -33715,6 +33715,7 @@ CVE-2020-16156 [Signature Verification Bypass] - perl <unfixed> [bullseye] - perl <no-dsa> (Minor issue) [buster] - perl <no-dsa> (Minor issue) + [stretch] - perl <no-dsa> (Minor issue) NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html CVE-2020-16155 [does not uniquely define signed data] |