CVE-2023-47038

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*

History

27 Mar 2025, 14:42

Type Values Removed Values Added
CPE cpe:2.3:a:perl:perl:5.34.0:*:*:*:*:*:*:* cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:9.4:*:*:*:*:*:*:*
References () https://access.redhat.com/errata/RHSA-2024:2228 - () https://access.redhat.com/errata/RHSA-2024:2228 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2024:3128 - () https://access.redhat.com/errata/RHSA-2024:3128 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-47038 - Third Party Advisory, Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ - Third Party Advisory
References () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property - () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property - Vendor Advisory
First Time Redhat enterprise Linux Aus
Fedoraproject fedora
Fedoraproject
Redhat enterprise Linux Eus

21 Nov 2024, 08:29

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ -
  • () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property -
References () https://access.redhat.com/errata/RHSA-2024:2228 - () https://access.redhat.com/errata/RHSA-2024:2228 -
References () https://access.redhat.com/errata/RHSA-2024:3128 - () https://access.redhat.com/errata/RHSA-2024:3128 -
References () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.0

16 Sep 2024, 16:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property', 'source': 'secalert@redhat.com'}

30 May 2024, 14:15

Type Values Removed Values Added
Summary (en) A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer. (en) A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

22 May 2024, 17:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3128 -

30 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2228 -

28 Mar 2024, 14:15

Type Values Removed Values Added
References
  • () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property -

05 Feb 2024, 07:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ -

29 Dec 2023, 22:46

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Perl. Este problema ocurre cuando Perl compila una expresión regular manipulada, lo que puede permitir que un atacante controle el desbordamiento de búfer de bytes en un búfer asignado en el almacenamiento dinámico.
CVSS v2 : unknown
v3 : 7.0
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.34.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
First Time Perl perl
Redhat enterprise Linux
Perl
Redhat
References () https://access.redhat.com/security/cve/CVE-2023-47038 - () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking
CWE CWE-787

18 Dec 2023, 15:04

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-18 14:15

Updated : 2025-03-27 14:42


NVD link : CVE-2023-47038

Mitre link : CVE-2023-47038

CVE.ORG link : CVE-2023-47038


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_eus
  • enterprise_linux_aus

perl

  • perl

fedoraproject

  • fedora
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write