The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
https://usn.ubuntu.com/3625-2/
https://usn.ubuntu.com/3625-1/
https://security.gentoo.org/glsa/201701-75
http://www.securitytracker.com/id/1036260
http://www.securityfocus.com/bid/91685
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.openwall.com/lists/oss-security/2016/07/07/1