{"id":"MGASA-2016-0299","summary":"Updated perl-XSLoader packages fix security vulnerability","details":"An arbitrary code execution can be achieved if loading code from untrusted\ncurrent working directory despite the '.' is removed from @INC.\nVulnerability is in XSLoader that uses caller() information to locate .so\nfile to load. If malicious attacker creates directory named `(eval 1)`\nwith malicious binary file in it, it will be loaded if the package calling\nXSLoader is in parent  directory (CVE-2016-6185).\n","modified":"2026-04-16T01:49:00.815946837Z","published":"2016-09-16T09:27:13Z","upstream":["CVE-2016-6185"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0299.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18894"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/"}],"affected":[{"package":{"name":"perl-XSLoader","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/perl-XSLoader?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.160.0-7.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0299.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}