CVE-2023-47038

Source
https://cve.org/CVERecord?id=CVE-2023-47038
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47038.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-47038
Downstream
Related
Published
2023-12-18T14:15:08.933Z
Modified
2026-03-02T08:02:49.980812Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

References

Affected packages

Git / github.com/perl/perl5

Affected ranges

Type
GIT
Repo
https://github.com/perl/perl5
Events

Affected versions

v5.*
v5.30.0
v5.31.0
v5.31.1
v5.31.10
v5.31.11
v5.31.2
v5.31.3
v5.31.4
v5.31.5
v5.31.6
v5.31.7
v5.31.8
v5.31.9
v5.32.0
v5.32.0-RC0
v5.32.0-RC1
v5.33.0
v5.33.1
v5.33.2
v5.33.3
v5.33.4
v5.33.5
v5.33.6
v5.33.7
v5.33.8
v5.33.9
v5.34.0
v5.34.0-RC1
v5.34.0-RC2
v5.35.0
v5.35.1
v5.35.10
v5.35.11
v5.35.2
v5.35.3
v5.35.4
v5.35.5
v5.35.6
v5.35.7
v5.35.8
v5.35.9
v5.36.0
v5.36.0-RC1
v5.36.0-RC3
v5.37.0
v5.37.1
v5.37.10
v5.37.11
v5.37.2
v5.37.3
v5.37.4
v5.37.5
v5.37.6
v5.37.7
v5.37.8
v5.37.9
v5.38.0
v5.38.0-RC1
v5.38.0-RC2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47038.json"