First published: Mon Dec 13 2021(Updated: )
CPAN 2.28 allows Signature Verification Bypass.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Comprehensive Perl Archive Network | =2.28 | |
Perl Comprehensive Perl Archive Network | =2.28-trial | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16156 refers to a vulnerability in CPAN 2.28 that allows Signature Verification Bypass.
CVE-2020-16156 has a severity rating of 7.8, which is considered high.
CPAN version 2.28 and CPAN version 2.28-trial are affected by CVE-2020-16156.
Yes, there are fixes available for CVE-2020-16156.
You can find more information about CVE-2020-16156 in the references provided: [1](http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html), [2](https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/), [3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/)