Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
History

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Perl
Perl crypt::sodium::xs
Vendors & Products Perl
Perl crypt::sodium::xs

Sun, 08 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
References

Sun, 08 Mar 2026 01:30:00 +0000

Type Values Removed Values Added
Description Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
Title Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows
Weaknesses CWE-190
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published: 2026-03-08T00:54:56.404Z

Updated: 2026-03-08T04:33:15.988Z

Reserved: 2026-03-07T13:09:20.641Z

Link: CVE-2026-30910

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-08T02:16:00.620

Modified: 2026-03-09T13:35:07.393

Link: CVE-2026-30910

cve-icon Redhat

No data.