The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
perl5.git.perl.org/perl.git/commitdiff/08e3451d7
www.debian.org/security/2016/dsa-3628
www.openwall.com/lists/oss-security/2016/07/07/1
www.openwall.com/lists/oss-security/2016/07/08/5
www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
www.securityfocus.com/bid/91685
www.securitytracker.com/id/1036260
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
rt.cpan.org/Public/Bug/Display.html?id=115808
security.gentoo.org/glsa/201701-75
usn.ubuntu.com/3625-1/
usn.ubuntu.com/3625-2/