CVE-2023-47038
18.12.2023, 14:15
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.Enginsight
Vendor | Product | Version |
---|---|---|
perl | perl | 5.30.0 ≤ 𝑥 ≤ 5.38.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 9.0 |
redhat | enterprise_linux_aus | 9.4 |
redhat | enterprise_linux_eus | 9.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
perl |
| ||||||||||||||||||
perl6 |
| ||||||||||||||||||
raku |
|
Common Weakness Enumeration
- CWE-122 - Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
References