PT-2026-40603 · Leont · Crypt::Argon2
Published
2026-05-13
·
Updated
2026-05-13
·
CVE-2026-8463
CVSS v3.1
5.3
Medium
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Crypt::Argon2 versions from 0.017 before 0.031 for Perl perform a heap out-of-bounds read in argon2 verify on empty encoded input.
The auto-detect form of argon2 verify passes encoded len - 1 as the length argument to memchr without checking that encoded len is non-zero. When the encoded string is empty, the size t subtraction underflows to SIZE MAX and memchr scans adjacent heap memory looking for a '$' separator byte.
A caller that invokes argon2 verify against a stored hash that may legitimately be empty (for example a placeholder row or a NULL column materialised as an empty string) reads out-of-bounds heap memory, which can crash the process or leak the position of an adjacent '$' byte into subsequent parsing.
Fix
Integer Underflow
Buffer Over-read
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Crypt::Argon2