A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 16 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-11-27T20:34:37.926Z
Reserved: 2023-10-30T13:58:15.255Z
Link: CVE-2023-47038

Updated: 2024-08-02T21:01:22.214Z

Status : Modified
Published: 2023-12-18T14:15:08.933
Modified: 2024-11-21T08:29:38.927
Link: CVE-2023-47038
