CVE-2026-41564

CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their constructors and reuse it without fork detection. A Crypt::PK::* object created before `fork()` shares byte-identical PRNG state with every child process, and any randomized operation they perform can produce identical output, including key generation. Two ECDSA or DSA signatures from different processes are enough to recover the signing private key through nonce-reuse key recovery. This affects preforking services such as the Starman web server, where a Crypt::PK::* object loaded at startup is inherited by every worker process.
Configurations

No configuration.

History

23 Apr 2026, 14:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6 - () https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6 -

23 Apr 2026, 10:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/04/23/2 -

23 Apr 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 08:16

Updated : 2026-04-24 14:50


NVD link : CVE-2026-41564

Mitre link : CVE-2026-41564

CVE.ORG link : CVE-2026-41564


JSON object : View

Products Affected

No product.

CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)

CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)