CVE-2020-16156: CPAN 2.28 allows Signature Verification Bypass. Can't see if there's a fixed version based on URL.
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html Fixed in dev-lang/perl-5.34.0-r6 (to be committed) via pulling in CPAN-2.29
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6c82144c1ddc4de8941a324083ff839f32365a78 commit 6c82144c1ddc4de8941a324083ff839f32365a78 Author: Andreas K. Hüttel <dilfridge@gentoo.org> AuthorDate: 2021-12-18 15:56:28 +0000 Commit: Andreas K. Hüttel <dilfridge@gentoo.org> CommitDate: 2021-12-18 15:56:28 +0000 dev-lang/perl: Revbump, requires CPAN 2.29 Bug: https://bugs.gentoo.org/829117 Package-Manager: Portage-3.0.28, Repoman-3.0.3 Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org> dev-lang/perl/perl-5.34.0-r6.ebuild | 813 ++++++++++++++++++++++++++++++++++++ 1 file changed, 813 insertions(+)