CVE-2023-47038

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Configurations

Configuration 1 (hide)

cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*

History

27 Mar 2025, 14:42

Type Values Removed Values Added
First Time Redhat enterprise Linux Aus
Fedoraproject fedora
Fedoraproject
Redhat enterprise Linux Eus
CPE cpe:2.3:a:perl:perl:5.34.0:*:*:*:*:*:*:* cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:9.4:*:*:*:*:*:*:*
References () https://access.redhat.com/errata/RHSA-2024:2228 - () https://access.redhat.com/errata/RHSA-2024:2228 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2024:3128 - () https://access.redhat.com/errata/RHSA-2024:3128 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-47038 - Third Party Advisory, Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ - Third Party Advisory
References () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property - () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property - Vendor Advisory

21 Nov 2024, 08:29

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ -
  • () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property -
References () https://access.redhat.com/errata/RHSA-2024:2228 - () https://access.redhat.com/errata/RHSA-2024:2228 -
References () https://access.redhat.com/errata/RHSA-2024:3128 - () https://access.redhat.com/errata/RHSA-2024:3128 -
References () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.0

16 Sep 2024, 16:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property', 'source': 'secalert@redhat.com'}

30 May 2024, 14:15

Type Values Removed Values Added
Summary (en) A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer. (en) A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

22 May 2024, 17:16

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:3128 -

30 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:2228 -

28 Mar 2024, 14:15

Type Values Removed Values Added
References
  • () https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property -

05 Feb 2024, 07:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/ -

29 Dec 2023, 22:46

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2023-47038 - () https://access.redhat.com/security/cve/CVE-2023-47038 - Vendor Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746 - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - () https://bugzilla.redhat.com/show_bug.cgi?id=2249523 - Issue Tracking
Summary
  • (es) Se encontró una vulnerabilidad en Perl. Este problema ocurre cuando Perl compila una expresión regular manipulada, lo que puede permitir que un atacante controle el desbordamiento de búfer de bytes en un búfer asignado en el almacenamiento dinámico.
CWE CWE-787
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.34.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
First Time Perl perl
Redhat enterprise Linux
Perl
Redhat
CVSS v2 : unknown
v3 : 7.0
v2 : unknown
v3 : 7.8

18 Dec 2023, 15:04

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-18 14:15

Updated : 2025-03-27 14:42


NVD link : CVE-2023-47038

Mitre link : CVE-2023-47038

CVE.ORG link : CVE-2023-47038


JSON object : View

Products Affected

perl

  • perl

redhat

  • enterprise_linux_eus
  • enterprise_linux_aus
  • enterprise_linux

fedoraproject

  • fedora
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write