{"id":"CVE-2023-47038","summary":"Perl: write past buffer end via illegal user-defined unicode property","details":"A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.","modified":"2026-05-20T03:52:42.464642760Z","published":"2023-12-18T13:43:07.713Z","related":["ALSA-2024:2228","ALSA-2024:3128","openSUSE-SU-2024:13479-1"],"database_specific":{"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/47xxx/CVE-2023-47038.json","cwe_ids":["CWE-122"]},"references":[{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056746"},{"type":"WEB","url":"https://github.com/aquasecurity/trivy/discussions/8400"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNEEWAACXQCEEAKSG7XX2D5YDRWLCIZJ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMDZZ4SCEW6FRWZDMXGAKZ35THTAWFG6/"},{"type":"WEB","url":"https://perldoc.perl.org/perl5382delta#CVE-2023-47038-Write-past-buffer-end-via-illegal-user-defined-Unicode-property"},{"type":"WEB","url":"https://ubuntu.com/security/CVE-2023-47100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-47100.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2228"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3128"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-47038"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/47xxx/CVE-2023-47038.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-47038"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249523"},{"type":"FIX","url":"https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010"},{"type":"FIX","url":"https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6"},{"type":"FIX","url":"https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3"},{"type":"PACKAGE","url":"https://github.com/Perl/perl5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/perl/perl5","events":[{"introduced":"76298ae68aa7796f0ffc05095b127d23f4b2de8f"},{"fixed":"55dd2f792ffc8cefe614350a411f785374281b24"}]}],"versions":["v5.38.1","v5.38.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-47038.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}