Release date:
2022-11-10 22:08:01 UTC
Description:
* SECURITY UPDATE: Signature verification bypass
- debian/patches/fixes/CVE-2020-16156.patch: recognize CANNOT_VERIFY
signature verification type, add two new failure modes based on
'cpan_path' and improve interaction with external 'gpg' executable.
- CVE-2020-16156
Updated packages:
-
libperl-dev_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
sha:f1996425ff8096b5e5b5bbb2ca37f111969e1961
-
libperl5.22_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
sha:4c85255ab6cf819c1d68abc2778326d9b28c41b4
-
perl_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
sha:ba6eec60ff084f8fabf2b901b9641840bcb0c83c
-
perl-base_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
sha:5d95610265c7891913f9e9a1bd20adbf57cbbabd
-
perl-debug_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
sha:770ad122c919ce0b6553e6a07e8f0e9c15d39f29
-
perl-doc_5.22.1-9ubuntu0.9+tuxcare.els1_all.deb
sha:4925ed52265a4acf0c0741c87bbe40ea2d3b4dcc
-
perl-modules-5.22_5.22.1-9ubuntu0.9+tuxcare.els1_all.deb
sha:1f4cc902caeb7c510eaa0fb623139cf5884822b6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.