Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 588592 (CVE-2016-6185) - <dev-lang/perl-{5.22.3_rc4,5.24.1_rc4}: XSLoader loads relative paths not included in @INC (CVE-2016-6185)
Summary: <dev-lang/perl-{5.22.3_rc4,5.24.1_rc4}: XSLoader loads relative paths not inc...
Status: RESOLVED FIXED
Alias: CVE-2016-6185
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A2 [glsa cve]
Keywords:
Depends on: CVE-2016-1238
Blocks:
  Show dependency tree
 
Reported: 2016-07-11 10:53 UTC by Agostino Sarubbo
Modified: 2017-01-29 23:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-07-11 10:53:21 UTC
From ${URL} :

An arbitrary code execution can be achieved if loading code from untrusted current working directory despite the '.' is removed from @INC. Vulnerability 
is in XSLoader that uses caller() information to locate .so file to load. If malicious attacker creates directory named `(eval 1)` with malicious binary 
file in it, it will be loaded if the package calling XSLoader is in parent directory.

CVE assignment:

http://seclists.org/oss-sec/2016/q3/28

Upstream bug:

https://rt.cpan.org/Public/Bug/Display.html?id=115808

Upstream patch:

http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Andreas K. Hüttel gentoo-dev 2016-07-17 16:08:07 UTC
Perl 5.22.3-RC1 is coming out today with more security fixes; the proper release of Perl 5.22.3 will most likely also include this fix and follow soon. I suggest we wait for that and stabilize it then rather quickly. 

[Given that the also security-related 5.22.2 stabilization is still in limbo for ages...]
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2016-11-19 11:52:54 UTC
CVE-2016-6185 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6185):
  The XSLoader::load method in XSLoader in Perl does not properly locate .so
  files when called in a string eval, which might allow local users to execute
  arbitrary code via a Trojan horse library under the current working
  directory.
Comment 3 Andreas K. Hüttel gentoo-dev 2016-12-08 15:46:57 UTC
Stabilization of the fixed version is taking place in bug 589680
Comment 4 Thomas Deutschmann gentoo-dev Security 2017-01-21 22:11:44 UTC
Added to existing GLSA request.
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2017-01-29 23:45:38 UTC
This issue was resolved and addressed in
 GLSA 201701-75 at https://security.gentoo.org/glsa/201701-75
by GLSA coordinator Thomas Deutschmann (whissi).