Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-23358 Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Ubuntu USN Ubuntu USN USN-5033-1 Perl vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:01:59.577Z

Reserved: 2021-07-17T00:00:00

Link: CVE-2021-36770

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-11T23:15:07.707

Modified: 2024-11-21T06:14:03.590

Link: CVE-2021-36770

cve-icon Redhat

Severity : Important

Publid Date: 2021-08-09T00:00:00Z

Links: CVE-2021-36770 - Bugzilla

cve-icon OpenCVE Enrichment

No data.