Vulnerability Description
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their constructors and reuse it without fork detection. A Crypt::PK::* object created before `fork()` shares byte-identical PRNG state with every child process, and any randomized operation they perform can produce identical output, including key generation. Two ECDSA or DSA signatures from different processes are enough to recover the signing private key through nonce-reuse key recovery. This affects preforking services such as the Starman web server, where a Crypt::PK::* object loaded at startup is inherited by every worker process.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dcit | Cryptx | < 0.088 |
Related Weaknesses (CWE)
References
- https://github.com/DCIT/perl-CryptX/commit/9a1dd3e0c27d68e32450be5538b864c2b115ePatch
- https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6Vendor Advisory
- https://metacpan.org/release/MIK/CryptX-0.088Product
- http://www.openwall.com/lists/oss-security/2026/04/23/2Mailing ListThird Party Advisory
- https://github.com/DCIT/perl-CryptX/security/advisories/GHSA-24c2-gp6c-24c6Vendor Advisory
FAQ
What is CVE-2026-41564?
CVE-2026-41564 is a vulnerability with a CVSS score of 7.5 (HIGH). CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519...
How severe is CVE-2026-41564?
CVE-2026-41564 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41564?
Check the references section above for vendor advisories and patch information. Affected products include: Dcit Cryptx.