Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3439b1c0-776c-4caf-be7f-519a7961b5d8@cpan.org>
Date: Thu, 5 Mar 2026 09:05:07 +0000
From: Robert Rothenberg <rrwo@...n.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-3257: UnQLite versions through 0.06 for Perl uses a
 potentially insecure version of the UnQLite library

========================================================================
CVE-2026-3257                                        CPAN Security Group
========================================================================

         CVE ID:  CVE-2026-3257
   Distribution:  UnQLite
       Versions:  through 0.06

       MetaCPAN:  https://metacpan.org/dist/UnQLite
       VCS Repo:  https://github.com/tokuhirom/UnQLite


UnQLite versions through 0.06 for Perl uses a potentially insecure
version of the UnQLite library

Description
-----------
UnQLite versions through 0.06 for Perl uses a potentially insecure
version of the UnQLite library.

UnQLite for Perl embeds the UnQLite library.  Version 0.06 and earlier
of the Perl module uses a version of the library from 2014 that may be
vulnerable to a heap-based overflow.

Problem types
-------------
- CWE-1395 Dependency on Vulnerable Third-Party Component

Workarounds
-----------
Upgrade to UnQLite for Perl version 0.07 or later.


Solutions
---------
UnQLite for Perl has been deprecated since version 0.06. Migrate to a
different solution.


References
----------
https://metacpan.org/release/TOKUHIROM/UnQLite-0.07/source/Changes
https://www.cve.org/CVERecord?id=CVE-2025-3791
https://unqlite.symisc.net/


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.