Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-23358 Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Ubuntu USN Ubuntu USN USN-5033-1 Perl vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T21:45:03.119Z

Reserved: 2021-07-17T00:00:00.000Z

Link: CVE-2021-36770

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-11T23:15:07.707

Modified: 2025-11-03T22:15:49.640

Link: CVE-2021-36770

cve-icon Redhat

Severity : Important

Publid Date: 2021-08-09T00:00:00Z

Links: CVE-2021-36770 - Bugzilla

cve-icon OpenCVE Enrichment

No data.