Description
Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems.

Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an unsigned long long is at least 64-bits.
Published: 2026-02-22
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an integer overflow flaw that occurs on 32‑bit systems when the Perl module Crypt::NaCl::Sodium casts a STRLEN (size_t) to an unsigned long long before passing it to libsodium functions. This incorrect type conversion can produce a length value that is too large for the actual buffer, leading to potential memory corruption. The flaw is classified as CWE-190 and carries a CVSS score of 9.1, indicating a severe risk that could allow an attacker to potentially execute arbitrary code or crash the application if exploited. The exact exploitation steps are not specified, but the likely attack vector is through any application that imports and uses the affected module, exploiting the distorted length parameter.

Affected Systems

The affected product is the Perl module Crypt::NaCl::Sodium from vendor TIMLEGGE. Versions up to and including 2.001 on 32‑bit platforms are impacted. The recommended safe version is 2.002 and later. The vulnerability affects only 32‑bit operating systems; 64‑bit systems are not susceptible due to the difference in size_t length.

Risk and Exploitability

With a CVSS score of 9.1 and an EPSS score of less than 1%, the probability of active exploitation is low but not negligible, and the vulnerability is not currently listed in the CISA KEV catalog. The combination of a very low exploitation probability and a severe severity score still necessitates prompt remediation. Inference indicates that the exploit requires a 32‑bit build and an application that relies on the Crypt::NaCl::Sodium module, making it less likely to be widely exploited across all Perl deployments. However, because memory corruption can lead to unpredictable behavior—including potential remote code execution—the risk remains significant if the module is used in sensitive or high‑privilege contexts.

Generated by OpenCVE AI on April 17, 2026 at 16:28 UTC.

Remediation

Vendor Solution

Upgrade to version 2.002


OpenCVE Recommended Actions

  • Upgrade Crypt::NaCl::Sodium to version 2.002 or later.
  • Remove the Crypt::NaCl::Sodium module from any application that cannot be updated immediately, or replace it with an alternative cryptographic library.
  • Consider migrating the environment to a 64‑bit architecture, where the size_t to unsigned long long conversion issue does not exist.

Generated by OpenCVE AI on April 17, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Timlegge crypt\
CPEs cpe:2.3:a:timlegge:crypt\:\:nacl\:\:sodium:*:*:*:*:*:perl:*:*
Vendors & Products Timlegge crypt\

Mon, 23 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Timlegge
Timlegge crypt::nacl::sodium
Vendors & Products Timlegge
Timlegge crypt::nacl::sodium

Sun, 22 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems. Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an unsigned long long is at least 64-bits.
Title Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems
Weaknesses CWE-190
References

Subscriptions

Timlegge Crypt::nacl::sodium Crypt\
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-02-23T18:47:51.202Z

Reserved: 2026-02-16T14:52:54.157Z

Link: CVE-2026-2588

cve-icon Vulnrichment

Updated: 2026-02-23T18:45:23.032Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-23T00:15:59.330

Modified: 2026-03-04T02:23:33.820

Link: CVE-2026-2588

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses