PT-2026-40603 · Leont · Crypt::Argon2

Published

2026-05-13

·

Updated

2026-05-13

·

CVE-2026-8463

CVSS v3.1

5.3

Medium

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Crypt::Argon2 versions from 0.017 before 0.031 for Perl perform a heap out-of-bounds read in argon2 verify on empty encoded input.
The auto-detect form of argon2 verify passes encoded len - 1 as the length argument to memchr without checking that encoded len is non-zero. When the encoded string is empty, the size t subtraction underflows to SIZE MAX and memchr scans adjacent heap memory looking for a '$' separator byte.
A caller that invokes argon2 verify against a stored hash that may legitimately be empty (for example a placeholder row or a NULL column materialised as an empty string) reads out-of-bounds heap memory, which can crash the process or leak the position of an adjacent '$' byte into subsequent parsing.

Fix

Integer Underflow

Buffer Over-read

Weakness Enumeration

Related Identifiers

CVE-2026-8463

Affected Products

Crypt::Argon2