Debian Package Tracker
Register | Log in
Subscribe

libcryptx-perl

Perl module that provides a self-contained cryptographic toolkit

Choose email to subscribe with

general
  • source: libcryptx-perl (main)
  • version: 0.087-2
  • maintainer: Debian Perl Group (archive) (DMD) (LowNMU)
  • uploaders: Lucas Kanashiro [DMD]
  • arch: any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.069-1
  • oldstable: 0.077-1
  • stable: 0.085-1
  • stable-p-u: 0.085-1+deb13u1
  • testing: 0.087-2
  • unstable: 0.087-2
versioned links
  • 0.069-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.077-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.085-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.085-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.087-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcryptx-perl (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 0.088 high
A new upstream version 0.088 is available, you should consider packaging it.
Created: 2026-04-23 Last update: 2026-05-02 15:33
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2025-40914: (needs triaging) Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

You can find information about how to handle this issue in the security team's documentation.

1 issue that should be fixed with the next stable update:
  • CVE-2026-41564: CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their constructors and reuse it without fork detection. A Crypt::PK::* object created before `fork()` shares byte-identical PRNG state with every child process, and any randomized operation they perform can produce identical output, including key generation. Two ECDSA or DSA signatures from different processes are enough to recover the signing private key through nonce-reuse key recovery. This affects preforking services such as the Starman web server, where a Crypt::PK::* object loaded at startup is inherited by every worker process.
Created: 2025-06-11 Last update: 2026-04-30 13:02
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2025-40914: (needs triaging) Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
  • CVE-2026-41564: (needs triaging) CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their constructors and reuse it without fork detection. A Crypt::PK::* object created before `fork()` shares byte-identical PRNG state with every child process, and any randomized operation they perform can produce identical output, including key generation. Two ECDSA or DSA signatures from different processes are enough to recover the signing private key through nonce-reuse key recovery. This affects preforking services such as the Starman web server, where a Crypt::PK::* object loaded at startup is inherited by every worker process.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-06-11 Last update: 2026-04-30 13:02
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 0.087-2 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2026-04-23 Last update: 2026-04-23 19:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-04-23 18:16
news
[rss feed]
  • [2026-04-30] Accepted libcryptx-perl 0.085-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2026-04-25] libcryptx-perl 0.087-2 MIGRATED to testing (Debian testing watch)
  • [2026-04-23] Accepted libcryptx-perl 0.087-2 (source) into unstable (Salvatore Bonaccorso)
  • [2025-08-18] libcryptx-perl 0.087-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-10] Accepted libcryptx-perl 0.087-1 (source) into unstable (gregor herrmann)
  • [2025-02-18] libcryptx-perl 0.085-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-15] Accepted libcryptx-perl 0.085-1 (source) into unstable (gregor herrmann)
  • [2024-10-31] libcryptx-perl 0.084-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-27] Accepted libcryptx-perl 0.084-1 (source) into unstable (gregor herrmann)
  • [2024-10-24] libcryptx-perl 0.082.001-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-14] Accepted libcryptx-perl 0.082.001-1 (source) into unstable (gregor herrmann)
  • [2024-10-10] libcryptx-perl 0.082-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-07] Accepted libcryptx-perl 0.082-1 (source) into unstable (gregor herrmann)
  • [2024-10-05] libcryptx-perl 0.081-2 MIGRATED to testing (Debian testing watch)
  • [2024-10-02] Accepted libcryptx-perl 0.081-2 (source) into unstable (gregor herrmann)
  • [2024-09-16] Accepted libcryptx-perl 0.081-1 (source) into unstable (gregor herrmann)
  • [2023-11-27] libcryptx-perl 0.080-2 MIGRATED to testing (Debian testing watch)
  • [2023-11-27] libcryptx-perl 0.080-2 MIGRATED to testing (Debian testing watch)
  • [2023-11-24] Accepted libcryptx-perl 0.080-2 (source) into unstable (gregor herrmann)
  • [2023-11-04] libcryptx-perl 0.080-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-01] Accepted libcryptx-perl 0.080-1 (source) into unstable (gregor herrmann)
  • [2023-06-27] libcryptx-perl 0.078-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-27] libcryptx-perl 0.078-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-25] Accepted libcryptx-perl 0.078-1 (source) into unstable (gregor herrmann)
  • [2022-08-27] libcryptx-perl 0.077-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-24] Accepted libcryptx-perl 0.077-1 (source) into unstable (gregor herrmann)
  • [2022-01-13] libcryptx-perl 0.076-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-10] Accepted libcryptx-perl 0.076-1 (source) into unstable (gregor herrmann)
  • [2021-12-28] libcryptx-perl 0.075-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-25] Accepted libcryptx-perl 0.075-1 (source) into unstable (gregor herrmann)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.087-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing