Описание
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 5.22.2-2 |
| devel | not-affected | 5.22.2-2 |
| esm-infra-legacy/trusty | released | 5.18.2-2ubuntu1.4 |
| esm-infra/xenial | released | 5.22.1-9ubuntu0.3 |
| precise | ignored | end of life |
| precise/esm | not-affected | 5.14.2-6ubuntu2.7 |
| trusty | released | 5.18.2-2ubuntu1.4 |
| trusty/esm | released | 5.18.2-2ubuntu1.4 |
| upstream | released | 5.22.2-2 |
| vivid/stable-phone-overlay | ignored | end of life |
Показывать по
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
The XSLoader::load method in XSLoader in Perl does not properly locate ...
The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3