๐Ÿ” CVE Alert

CVE-2026-30910

HIGH 7.5

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U

CWE CWE-190
Vendor iamb
Product crypt::sodium::xs
Published Mar 8, 2026
Last Updated Mar 10, 2026
Stay Ahead of the Next One

Get instant alerts for iamb crypt::sodium::xs

Be the first to know when new high vulnerabilities affecting iamb crypt::sodium::xs are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

IAMB / Crypt::Sodium::XS
0 โ‰ค 0.001000

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
metacpan.org: https://metacpan.org/release/IAMB/Crypt-Sodium-XS-0.001001/changes openwall.com: http://www.openwall.com/lists/oss-security/2026/03/08/2

Credits

Brad Barden <[email protected]>