Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
DEBIAN-CVE-2020-16156
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/CVE-2020-16156
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-16156.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-16156
Upstream
CVE-2020-16156
Published
2021-12-13T18:15:07Z
Modified
2025-09-19T07:30:55.525236Z
Summary
[none]
Details
CPAN 2.28 allows Signature Verification Bypass.
References
https://security-tracker.debian.org/tracker/CVE-2020-16156
Affected packages
Debian:11
/
perl
Package
Name
perl
Purl
pkg:deb/debian/perl?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.32.1-4+deb11u4
Affected versions
5.*
5.32.1-4
5.32.1-4+deb11u1
5.32.1-4+deb11u2
5.32.1-4+deb11u3
Ecosystem specific
{ "urgency": "not yet assigned" }
Debian:12
/
perl
Package
Name
perl
Purl
pkg:deb/debian/perl?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.36.0-4
Ecosystem specific
{ "urgency": "not yet assigned" }
Debian:13
/
perl
Package
Name
perl
Purl
pkg:deb/debian/perl?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.36.0-4
Ecosystem specific
{ "urgency": "not yet assigned" }
Debian:14
/
perl
Package
Name
perl
Purl
pkg:deb/debian/perl?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
5.36.0-4
Ecosystem specific
{ "urgency": "not yet assigned" }
DEBIAN-CVE-2020-16156 - OSV