Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <eb0f917db157d752ff8bdd581c6437cc@cpansec.org>
Date: Sat, 07 Mar 2026 21:22:02 -0400
From: Timothy Legge <timlegge@...nsec.org>
To: Oss Security <oss-security@...ts.openwall.com>
Subject: CVE-2026-30910: Crypt::Sodium::XS versions through 0.001000 for Perl
 has potential integer overflows

========================================================================
CVE-2026-30910                                       CPAN Security Group
========================================================================

         CVE ID:  CVE-2026-30910
   Distribution:  Crypt-Sodium-XS
       Versions:  through 0.001000

       MetaCPAN:  https://metacpan.org/dist/Crypt-Sodium-XS


Crypt::Sodium::XS versions through 0.001000 for Perl has potential
integer overflows

Description
-----------
Crypt::Sodium::XS versions through 0.001000 for Perl has potential
integer overflows.

Combined aead encryption, combined signature creation, and bin2hex
functions do not check that output size will be less than SIZE_MAX,
which could lead to integer wraparound causing an undersized output
buffer. This can cause a crash in bin2hex and encryption algorithms
other than aes256gcm. For aes256gcm encryption and signatures, an
undersized buffer could lead to buffer overflow.

Encountering this issue is unlikely as the message length would need to
be very large.

For bin2hex the input size would have to be > SIZE_MAX / 2
For aegis encryption the input size would need to be > SIZE_MAX - 32U
For other encryption the input size would need to be > SIZE_MAX - 16U
For signatures the input size would need to be > SIZE_MAX - 64U

Problem types
-------------
- CWE-190 Integer Overflow or Wraparound

Solutions
---------
Upgrade to version 0.001001


References
----------
https://metacpan.org/release/IAMB/Crypt-Sodium-XS-0.001001/changes

Credits
-------
Brad Barden <perlmodules@...0.org>, finder

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.