CVE-2023-47100
NixOS vulnerability analysis and mitigation

Overview

In Perl versions from 5.30.0 to before 5.38.2, a vulnerability was discovered in the Sparseuniprop_string function within regcomp.c. The vulnerability (CVE-2023-47100) involves improper handling of property names associated with \p{...} regular expression constructs, which can lead to writing to unallocated space (NVD, MITRE).

Technical details

The vulnerability occurs in the Sparseunipropstring() function which is used to parse the interior of both \p{} and user-defined sub lines. When processing a package name specifier 'utf8::', the code adjusts the lookupname pointer but fails to properly adjust all required values. This becomes problematic specifically when the property name begins with 'perl' (excluding 'perlspace' and 'perlword'). The issue results in lookup_name no longer pointing to its initial value while name remains unchanged, leading to potential writes to unallocated space. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical) (NVD).

Impact

The vulnerability allows writing to unallocated space, which could potentially lead to memory corruption. Given its CVSS score of 9.8 Critical, this vulnerability could have severe implications for system security and stability (NVD).

Mitigation and workarounds

The vulnerability has been fixed in Perl version 5.38.2. The solution involves properly handling the 'utf8::' package name stripping by ensuring both lookup_name and name are effectively shortened by the same amount (Perl Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management