First published: Mon Nov 13 2023(Updated: )
A crafted regular expression when compiled by perl 5.30.0 through 5.38.0 can cause a one attacker controlled byte buffer overflow in a heap allocated buffer.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM AIX | <=7.3 | |
IBM VIOS | <=4.1 | |
All of | ||
Perl Perl | =5.34.0 | |
Any of | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
ubuntu/perl | <5.30.0-9ubuntu0.5 | 5.30.0-9ubuntu0.5 |
ubuntu/perl | <5.34.0-3ubuntu1.3 | 5.34.0-3ubuntu1.3 |
ubuntu/perl | <5.36.0-7ubuntu0.23.04.2 | 5.36.0-7ubuntu0.23.04.2 |
ubuntu/perl | <5.36.0-9ubuntu1.1 | 5.36.0-9ubuntu1.1 |
redhat/perl | <5.32.1 | 5.32.1 |
debian/perl | 5.32.1-4+deb11u3 5.32.1-4+deb11u4 5.36.0-7+deb12u1 5.40.0-8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47038 is a vulnerability that allows an attacker to cause a buffer overflow in a heap-allocated buffer by using a crafted regular expression in Perl versions 5.30.0 through 5.38.0.
Perl versions 5.30.0 through 5.38.0 are affected by CVE-2023-47038.
The severity of CVE-2023-47038 is not specified in the provided information.
To fix CVE-2023-47038, you should update your Perl installation to a version that includes the necessary security patches.
You can find more information about CVE-2023-47038 on the MITRE CVE website, Ubuntu Security Notices, and NIST National Vulnerability Database.