7.8
CVSSv3

CVE-2023-47038

Published: 18/12/2023 Updated: 30/04/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.34.0

Vendor Advisories

Debian Bug report logs - #1056746 perl: CVE-2023-47038: Write past buffer end via illegal user-defined Unicode property Package: perl; Maintainer for perl is Niko Tyni <ntyni@debianorg>; Source for perl is src:perl (PTS, buildd, popcon) Reported by: Niko Tyni <ntyni@debianorg> Date: Sat, 25 Nov 2023 20:21:01 UTC S ...
Description<!---->A vulnerability was found in perl This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated bufferA vulnerability was found in perl This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker c ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> New CVEs and security fix releases for perl <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Alan Coopersmith &lt; ...

Github Repositories

Validate data against a schema

NAME JSON::Schema::Modern - Validate data against a schema VERSION version 0582 SYNOPSIS use JSON::Schema::Modern; $js = JSON::Schema::Modern-&gt;new( specification_version =&gt; 'draft2020-12', output_format =&gt; 'flag', # other options ); $result = $js-&gt;evaluate($instance_data, $schema_data);