The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "perl-debug": "5.18.2-2ubuntu1.4", "perl": "5.18.2-2ubuntu1.4", "perl-modules": "5.18.2-2ubuntu1.4", "libperl-dev": "5.18.2-2ubuntu1.4", "libperl5.18": "5.18.2-2ubuntu1.4", "libcgi-fast-perl": "5.18.2-2ubuntu1.4", "perl-doc": "5.18.2-2ubuntu1.4", "perl-base": "5.18.2-2ubuntu1.4" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "perl-debug": "5.22.1-9ubuntu0.3", "perl": "5.22.1-9ubuntu0.3", "perl-modules-5.22": "5.22.1-9ubuntu0.3", "libperl-dev": "5.22.1-9ubuntu0.3", "libperl5.22": "5.22.1-9ubuntu0.3", "perl-doc": "5.22.1-9ubuntu0.3", "perl-base": "5.22.1-9ubuntu0.3" } ] }