Description
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows.

Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow.

Encountering this issue is unlikely as the message length would need to be very large.

For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
Published: 2026-03-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Integer Overflow / Buffer Overflow
Action: Apply Patch
AI Analysis

Impact

Crypt::Sodium::XS up to 0.001000 allows integer overflows in functions such as combined aead encryption, signature creation, and bin2hex. The lack of bounds checking can cause the calculation of output sizes to wrap around, producing undersized buffers. For most algorithms this results in a crash, but for AES-256-GCM encryption and signatures the buffer underflow could lead to a buffer overflow that may corrupt memory or allow control flow hijack.

Affected Systems

The vulnerability affects the IAMB Crypt::Sodium::XS Perl module versions 0.000000 through 0.001000. Users deploying these versions of the module in any Perl framework, including web applications, command‑line tools, or services that rely on the module for cryptographic operations, are impacted. The provided CPE indicates the product's presence on Perl.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. EPSS is below 1 %, suggesting that exploitation is unlikely in the wild, and it is not listed in the CISA KEV catalog. Attackers would need to supply unusually large inputs to trigger the overflow, which may be infeasible in many contexts. Nonetheless, if an attacker controls the data passed to these functions, there is a non‑zero risk of memory corruption and potentially code execution.

Generated by OpenCVE AI on April 16, 2026 at 10:43 UTC.

Remediation

Vendor Solution

Upgrade to version 0.001001


OpenCVE Recommended Actions

  • Upgrade Crypt::Sodium::XS to version 0.001001 or later.
  • Validate input lengths to be well below SIZE_MAX before invoking the vulnerable functions, effectively preventing the integer wraparound.
  • Avoid using combined aead encryption, combined signature creation, or bin2hex on data that could reach near SIZE_MAX bounds, and consider alternative libraries for cryptographic operations that enforce safe bounds.

Generated by OpenCVE AI on April 16, 2026 at 10:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Iamb
Iamb crypt\
CPEs cpe:2.3:a:iamb:crypt\:\:sodium\:\:xs:*:*:*:*:*:perl:*:*
Vendors & Products Iamb
Iamb crypt\

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Perl
Perl crypt::sodium::xs
Vendors & Products Perl
Perl crypt::sodium::xs

Sun, 08 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
References

Sun, 08 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
Title Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows
Weaknesses CWE-190
References

Subscriptions

Iamb Crypt\
Perl Crypt::sodium::xs
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-03-10T13:42:58.942Z

Reserved: 2026-03-07T13:09:20.641Z

Link: CVE-2026-30910

cve-icon Vulnrichment

Updated: 2026-03-08T04:33:15.988Z

cve-icon NVD

Status : Modified

Published: 2026-03-08T02:16:00.620

Modified: 2026-03-10T18:18:51.633

Link: CVE-2026-30910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:45:26Z

Weaknesses