[CLSA-2022:1668118081] Fix CVE(s): CVE-2020-16156
Type:
security
Severity:
Important
Release date:
2022-11-10 22:08:01 UTC
Description:
* SECURITY UPDATE: Signature verification bypass - debian/patches/fixes/CVE-2020-16156.patch: recognize CANNOT_VERIFY signature verification type, add two new failure modes based on 'cpan_path' and improve interaction with external 'gpg' executable. - CVE-2020-16156
Updated packages:
  • libperl-dev_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
    sha:f1996425ff8096b5e5b5bbb2ca37f111969e1961
  • libperl5.22_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
    sha:4c85255ab6cf819c1d68abc2778326d9b28c41b4
  • perl_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
    sha:ba6eec60ff084f8fabf2b901b9641840bcb0c83c
  • perl-base_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
    sha:5d95610265c7891913f9e9a1bd20adbf57cbbabd
  • perl-debug_5.22.1-9ubuntu0.9+tuxcare.els1_amd64.deb
    sha:770ad122c919ce0b6553e6a07e8f0e9c15d39f29
  • perl-doc_5.22.1-9ubuntu0.9+tuxcare.els1_all.deb
    sha:4925ed52265a4acf0c0741c87bbe40ea2d3b4dcc
  • perl-modules-5.22_5.22.1-9ubuntu0.9+tuxcare.els1_all.deb
    sha:1f4cc902caeb7c510eaa0fb623139cf5884822b6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.