CVE-2026-2588

Perl (CPAN) · Crypt::NaCl::Sodium

Crypt::NaCl::Sodium for Perl contains an integer overflow on 32-bit systems when casting length pointers, potentially leading to memory corruption or cryptographic failures.

Executive summary

A critical integer overflow vulnerability in the Crypt::NaCl::Sodium Perl module on 32-bit systems could allow attackers to cause memory corruption or bypass security controls.

Vulnerability

An integer overflow exists on 32-bit systems where a 32-bit size_t is cast to a 64-bit unsigned long long when passing length pointers to libsodium. This discrepancy can lead to incorrect memory allocation or processing within the cryptographic library.

Business impact

Exploitation of this flaw can lead to application crashes, memory corruption, or the compromise of cryptographic operations. On 32-bit platforms, this poses a significant risk to the integrity of encrypted data and the overall stability of applications relying on this library. The CVSS score is 9.1.

Remediation

Immediate Action: Update the Crypt::NaCl::Sodium Perl module to the latest version via CPAN and recompile the module to ensure the fix is applied.

Proactive Monitoring: Monitor 32-bit systems for application crashes or unexpected behavior during cryptographic operations.

Compensating Controls: Migrate critical applications to 64-bit architectures where this specific integer overflow does not occur.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations running Perl applications on 32-bit systems must update this library immediately. The potential for memory corruption in a cryptographic module is a high-risk scenario that could undermine the security of the entire application stack.