CVE-2023-47038
CVSS V2 None
CVSS V3 None
Description
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Overview
- CVE ID
- CVE-2023-47038
- Assigner
- redhat
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-12-18T13:43:07.713Z
- Last Modified Date
- 2024-05-30T14:07:03.418Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:2228 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3128 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/security/cve/CVE-2023-47038 | vdb-entry x_refsource_REDHAT |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2249523 | issue-tracking x_refsource_REDHAT |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ | |
https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-47038 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 09:24:39 | Added to TrackCVE |