Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows.
Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow.
Encountering this issue is unlikely as the message length would need to be very large.
For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
References
| Link | Resource |
|---|---|
| https://metacpan.org/release/IAMB/Crypt-Sodium-XS-0.001001/changes | Release Notes |
| http://www.openwall.com/lists/oss-security/2026/03/08/2 | Mailing List Third Party Advisory |
Configurations
History
10 Mar 2026, 16:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Iamb
Iamb crypt\ |
|
| CPE | cpe:2.3:a:iamb:crypt\:\:sodium\:\:xs:*:*:*:*:*:perl:*:* | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://metacpan.org/release/IAMB/Crypt-Sodium-XS-0.001001/changes - Release Notes | |
| References | () http://www.openwall.com/lists/oss-security/2026/03/08/2 - Mailing List, Third Party Advisory |
08 Mar 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-08 02:16
Updated : 2026-03-10 18:18
NVD link : CVE-2026-30910
Mitre link : CVE-2026-30910
CVE.ORG link : CVE-2026-30910
JSON object : View
Products Affected
iamb
- crypt\
CWE
CWE-190
Integer Overflow or Wraparound
