Debian Package Tracker
Register | Log in
Subscribe

libcrypt-argon2-perl

Perl interface to the Argon2 key derivation functions

Choose email to subscribe with

general
  • source: libcrypt-argon2-perl (main)
  • version: 0.031-1
  • maintainer: Debian Perl Group (archive) (DMD) (LowNMU)
  • uploaders: Joenio Marques da Costa [DMD]
  • arch: any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 0.013-1
  • stable: 0.030-1
  • testing: 0.031-1
  • unstable: 0.031-1
versioned links
  • 0.013-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.030-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.031-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcrypt-argon2-perl
action needed
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-8463: (needs triaging) Crypt::Argon2 versions from 0.017 before 0.031 for Perl perform a heap out-of-bounds read in argon2_verify on empty encoded input. The auto-detect form of argon2_verify passes encoded_len - 1 as the length argument to memchr without checking that encoded_len is non-zero. When the encoded string is empty, the size_t subtraction underflows to SIZE_MAX and memchr scans adjacent heap memory looking for a '$' separator byte. A caller that invokes argon2_verify against a stored hash that may legitimately be empty (for example a placeholder row or a NULL column materialised as an empty string) reads out-of-bounds heap memory, which can crash the process or leak the position of an adjacent '$' byte into subsequent parsing.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-05-13 Last update: 2026-05-18 01:00
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-8463: (needs triaging) Crypt::Argon2 versions from 0.017 before 0.031 for Perl perform a heap out-of-bounds read in argon2_verify on empty encoded input. The auto-detect form of argon2_verify passes encoded_len - 1 as the length argument to memchr without checking that encoded_len is non-zero. When the encoded string is empty, the size_t subtraction underflows to SIZE_MAX and memchr scans adjacent heap memory looking for a '$' separator byte. A caller that invokes argon2_verify against a stored hash that may legitimately be empty (for example a placeholder row or a NULL column materialised as an empty string) reads out-of-bounds heap memory, which can crash the process or leak the position of an adjacent '$' byte into subsequent parsing.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-05-13 Last update: 2026-05-18 01:00
news
[rss feed]
  • [2026-05-18] libcrypt-argon2-perl 0.031-1 MIGRATED to testing (Debian testing watch)
  • [2026-05-13] Accepted libcrypt-argon2-perl 0.031-1 (source) into unstable (gregor herrmann)
  • [2025-06-02] libcrypt-argon2-perl 0.030-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-12] Accepted libcrypt-argon2-perl 0.030-1 (source) into unstable (gregor herrmann)
  • [2024-08-13] libcrypt-argon2-perl 0.029-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-10] Accepted libcrypt-argon2-perl 0.029-1 (source) into unstable (gregor herrmann)
  • [2024-08-10] Accepted libcrypt-argon2-perl 0.026-1 (source) into unstable (gregor herrmann)
  • [2024-05-03] libcrypt-argon2-perl 0.022-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-13] Accepted libcrypt-argon2-perl 0.022-1 (source) into unstable (gregor herrmann)
  • [2023-11-05] libcrypt-argon2-perl 0.020-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-05] libcrypt-argon2-perl 0.020-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-02] Accepted libcrypt-argon2-perl 0.020-1 (source) into unstable (gregor herrmann)
  • [2023-02-13] libcrypt-argon2-perl 0.013-1 MIGRATED to testing (Debian testing watch)
  • [2023-02-11] Accepted libcrypt-argon2-perl 0.013-1 (source) into unstable (gregor herrmann)
  • [2022-09-14] libcrypt-argon2-perl 0.012-2 MIGRATED to testing (Debian testing watch)
  • [2022-09-12] Accepted libcrypt-argon2-perl 0.012-2 (source) into unstable (Damyan Ivanov)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.030-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing