Summary: | <dev-lang/perl-{5.22.3_rc4,5.24.1_rc4}: XSLoader loads relative paths not included in @INC (CVE-2016-6185) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | perl |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1354386 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 589680 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() Perl 5.22.3-RC1 is coming out today with more security fixes; the proper release of Perl 5.22.3 will most likely also include this fix and follow soon. I suggest we wait for that and stabilize it then rather quickly. [Given that the also security-related 5.22.2 stabilization is still in limbo for ages...] CVE-2016-6185 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185): The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. Stabilization of the fixed version is taking place in bug 589680 Added to existing GLSA request. This issue was resolved and addressed in GLSA 201701-75 at https://security.gentoo.org/glsa/201701-75 by GLSA coordinator Thomas Deutschmann (whissi). |