CVE-2026-2588
Perl (CPAN) · Crypt::NaCl::Sodium
Crypt::NaCl::Sodium for Perl contains an integer overflow on 32-bit systems when casting length pointers, potentially leading to memory corruption or cryptographic failures.
Executive summary
A critical integer overflow vulnerability in the Crypt::NaCl::Sodium Perl module on 32-bit systems could allow attackers to cause memory corruption or bypass security controls.
Vulnerability
An integer overflow exists on 32-bit systems where a 32-bit size_t is cast to a 64-bit unsigned long long when passing length pointers to libsodium. This discrepancy can lead to incorrect memory allocation or processing within the cryptographic library.
Business impact
Exploitation of this flaw can lead to application crashes, memory corruption, or the compromise of cryptographic operations. On 32-bit platforms, this poses a significant risk to the integrity of encrypted data and the overall stability of applications relying on this library. The CVSS score is 9.1.
Remediation
Immediate Action: Update the Crypt::NaCl::Sodium Perl module to the latest version via CPAN and recompile the module to ensure the fix is applied.
Proactive Monitoring: Monitor 32-bit systems for application crashes or unexpected behavior during cryptographic operations.
Compensating Controls: Migrate critical applications to 64-bit architectures where this specific integer overflow does not occur.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations running Perl applications on 32-bit systems must update this library immediately. The potential for memory corruption in a cryptographic module is a high-risk scenario that could undermine the security of the entire application stack.