Perl Safe module: Arbitrary Perl code injection The Safe module for Perl does not properly restrict code, allowing a remote attacker to execute arbitrary Perl code outside of a restricted compartment. Safe 2011-11-20 2011-11-20 325563 remote 2.27 2.27 2.27 2.27

Safe is a Perl module to compile and execute code in restricted compartments.

Unsafe code evaluation prevents the Safe module from properly restricting the code of implicitly called methods on implicitly blessed objects.

A remote attacker could entice a user to load a specially crafted Perl script, resulting in execution arbitrary Perl code outside of a restricted compartment.

There is no known workaround at this time.

All users of the standalone Perl Safe module should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=perl-core/Safe-2.27"

All users of the Safe module bundled with Perl should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=virtual/perl-Safe-2.27"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since July 18, 2010. It is likely that your system is already no longer affected by this issue.

CVE-2010-1168 underling ackle