CVE-2020-16156
Name
CVE-2020-16156
Description
CPAN 2.28 allows Signature Verification Bypass.
NVD Severity
medium
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
MISC
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
MISC
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
MISC
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:perl:comprehensive_perl_archive_network:2.28:-:*:*:*:perl:*:*
perl-comprehensive-perl-archive-network
== None
== 2.28
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status