CVE-2020-16156

NameCVE-2020-16156
DescriptionCPAN 2.28 allows Signature Verification Bypass.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3926-1, ELA-1226-1
Debian Bugs1015985

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
perl (PTS)jessie, jessie (lts)5.20.2-3+deb8u14fixed
stretch (security)5.24.1-3+deb9u5vulnerable
stretch (lts), stretch5.24.1-3+deb9u8fixed
buster, buster (lts)5.28.1-6+deb10u2fixed
bullseye5.32.1-4+deb11u3vulnerable
bullseye (security)5.32.1-4+deb11u4fixed
bookworm5.36.0-7+deb12u1fixed
sid, trixie5.40.0-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
perlsourcejessie5.20.2-3+deb8u14ELA-1226-1
perlsourcestretch5.24.1-3+deb9u8ELA-1226-1
perlsourcebuster5.28.1-6+deb10u2ELA-1226-1
perlsourcebullseye5.32.1-4+deb11u4DLA-3926-1
perlsource(unstable)5.36.0-41015985

Notes

[buster] - perl <no-dsa> (Minor issue)
[stretch] - perl <no-dsa> (Minor issue)
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://bugzilla.redhat.com/show_bug.cgi?id=2035273
https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c (2.29)
https://github.com/andk/cpanpm/commit/bcbf6d608e48d25306ecfd273118b4d6ba1c5df6 (2.29)
https://github.com/andk/cpanpm/commit/46fe910becd5746adca92e18660567c9e8d37eb5 (2.29)
https://github.com/andk/cpanpm/commit/7f9e5e8c52f535c1c13e177595a5ef4710c72058 (2.29)
https://github.com/andk/cpanpm/commit/c03257dbebccd4deeff1987d5efd98113643f717 (2.29)
https://github.com/andk/cpanpm/commit/7d4d5e32bcd9b75f7bf70a395938a48ca4a06d25 (2.33-TRIAL)
https://github.com/andk/cpanpm/commit/89b13baf1d46e4fb10023af30ef305efec4fd603 (2.33-TRIAL)

Search for package or bug name: Reporting problems