CPANSA-Crypt-Sodium-XS-2026-30910: Crypt-Sodium-XS vulnerability
| Publisher | giterlizzi | Document category | csaf_security_advisory |
|---|---|---|---|
| Initial release date | 2026-03-08T00:00:00 | Engine | CSAF Perl Toolkit 0.26 |
| Current release date | 2026-03-08T00:00:00 | Build Date | |
| Current version | 1 | Status | final |
| CVSS v3.1 Base Score | 7.5 | Severity | |
| Original language | Language | en | |
| Also referred to | |||
Vulnerability Description
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
Vulnerabilities
CVE-2026-30910
Vulnerability DescriptionCrypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows.
Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow.
Encountering this issue is unlikely as the message length would need to be very large.
For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
| Weakness | CWE-190 : Integer Overflow or Wraparound |
|---|
Product status
Known affected
| Product | Score | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Crypt-Sodium-XS less than 0.001001 |
|
Fixed
- Crypt-Sodium-XS greater than or equal 0.001001
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Crypt-Sodium-XS-2026-30910 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2026/cpansa-crypt-sodium-xs-2026-30910.json - https://metacpan.org/release/IAMB/Crypt-Sodium-XS-0.001001/changes external
https://metacpan.org/release/IAMB/Crypt-Sodium-XS-0.001001/changes - http://www.openwall.com/lists/oss-security/2026/03/08/2 external
http://www.openwall.com/lists/oss-security/2026/03/08/2 - CVE-2026-30910 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2026-30910
Revision history
| Version | Date of the revision | Summary of the revision |
|---|---|---|
| 1 | Sun Mar 8 00:00:00 2026 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/