Package | perl |
---|---|
Version | 5.20.2-3+deb8u14 (jessie), 5.24.1-3+deb9u8 (stretch), 5.28.1-6+deb10u2 (buster) |
Related CVEs | CVE-2020-16156 CVE-2023-31484 |
Perl a popular script language was affected by multiple vulnerabilities.
CVE-2020-16156:
An attacker can prepend checksums for modified
packages to the beginning of CHECKSUMS files,
before the cleartext PGP headers. This makes
the Module::Signature::_verify() checks
in both cpan and cpanm pass.
Without the sigtext and plaintext arguments
to _verify(), the _compare() check is bypassed.
This results in _verify() only checking that
valid signed cleartext is present somewhere
in the file.
CVE-2023-31484:
CPAN.pm does not verify TLS certificates
when downloading distributions over HTTPS.
For Debian 10 buster, these problems have been fixed in version 5.28.1-6+deb10u2.
For Debian 8 jessie, these problems have been fixed in version 5.20.2-3+deb8u14.
For Debian 9 stretch, these problems have been fixed in version 5.24.1-3+deb9u8.
We recommend that you upgrade your perl packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.