On Thu, 19 Mar 2020 05:53:24 +0100, Salvatore Bonaccorso wrote:
> CVE-2020-10674[0]:
> | PerlSpeak through 2.01 allows attackers to execute arbitrary OS
> | commands, as demonstrated by use of system and 2-argument open.
>
> Gregor, the module seem to be basically unmaintained, I would propose
>
Source: libperlspeak-perl
Version: 2.01-2
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://rt.cpan.org/Public/Bug/Display.html?id=132173
Control: tags -1 + stretch buster bullseye sid
Hi,
The following vulnerability was published for libperlspeak-perl.
2 matches
Mail list logo