CVE-2016-6185

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-6185
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6185.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-6185
Related
Published
2016-08-02T14:59:02Z
Modified
2025-02-19T02:13:26.440496Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

References

Affected packages

Debian:11 / perl

Package

Name
perl
Purl
pkg:deb/debian/perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.22.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / perl

Package

Name
perl
Purl
pkg:deb/debian/perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.22.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / perl

Package

Name
perl
Purl
pkg:deb/debian/perl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.22.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/perl/perl5

Affected ranges

Type
GIT
Repo
https://github.com/perl/perl5
Events

Affected versions

if-0.*

if-0.0605

v5.*

v5.23.0
v5.23.1
v5.23.2
v5.23.3
v5.23.4
v5.23.5
v5.23.6
v5.23.7
v5.23.8
v5.23.9
v5.24.0
v5.24.0-RC1
v5.24.0-RC2
v5.24.0-RC3
v5.24.0-RC4
v5.24.0-RC5
v5.24.1-RC1
v5.24.1-RC2
v5.24.1-RC3
v5.24.1-RC4
v5.24.1-RC5