๐Ÿ” CVE Alert

CVE-2026-41564

UNKNOWN 0.0

CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their constructors and reuse it without fork detection. A Crypt::PK::* object created before `fork()` shares byte-identical PRNG state with every child process, and any randomized operation they perform can produce identical output, including key generation. Two ECDSA or DSA signatures from different processes are enough to recover the signing private key through nonce-reuse key recovery. This affects preforking services such as the Starman web server, where a Crypt::PK::* object loaded at startup is inherited by every worker process.

CWE CWE-335 CWE-338
Vendor mik
Product cryptx
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for mik cryptx

Be the first to know when new unknown vulnerabilities affecting mik cryptx are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

MIK / CryptX
0 < 0.088

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6 github.com: https://github.com/DCIT/perl-CryptX/commit/9a1dd3e0c27d68e32450be5538b864c2b115ee15.patch metacpan.org: https://metacpan.org/release/MIK/CryptX-0.088 openwall.com: http://www.openwall.com/lists/oss-security/2026/04/23/2