Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows
Vulnerability Description
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U
CVSS Information
N/A
Vulnerability Type
整数溢出或超界折返
Vulnerability Title
Crypt::Sodium::XS 安全漏洞
Vulnerability Description
Crypt::Sodium::XS是IAMB个人开发者的一个现代密码学函数的Perl加密库。 Crypt::Sodium::XS 0.001000及之前版本存在安全漏洞,该漏洞源于整数溢出,可能导致缓冲区溢出或崩溃。
CVSS Information
N/A
Vulnerability Type
N/A