Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws.

When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Upgrade to 1.95 or later.


Workaround

Do not parse untrusted PKCS12 files via info or info_as_hash.

History

Sun, 17 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap-OOB-WRITE would be triggered which could have Remote Code Execution (RCE) potential.
Title Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out of bound (OOB) write flaws
Weaknesses CWE-787
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-17T18:43:05.863Z

Reserved: 2026-05-13T22:45:07.737Z

Link: CVE-2026-8507

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T19:16:24.590

Modified: 2026-05-17T19:16:24.590

Link: CVE-2026-8507

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T20:30:09Z

Weaknesses