CVE-2023-47038

Source
https://cve.org/CVERecord?id=CVE-2023-47038
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47038.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-47038
Downstream
Related
Published
2023-12-18T13:43:07.713Z
Modified
2026-05-20T03:52:42.464642760Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Perl: write past buffer end via illegal user-defined unicode property
Details

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/47xxx/CVE-2023-47038.json",
    "cna_assigner": "redhat",
    "cwe_ids": [
        "CWE-122"
    ]
}
References

Affected packages

Git / github.com/perl/perl5

Affected ranges

Type
GIT
Repo
https://github.com/perl/perl5
Events

Affected versions

v5.*
v5.38.0
v5.38.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47038.json"