| Name | CVE-2026-8700 |
| Description | Crypt::DSA versions before 1.20 for Perl generate seeds using rand. Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1136808 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| libcrypt-dsa-perl (PTS) | bullseye | 1.17-4 | vulnerable |
| bookworm | 1.17-5 | vulnerable |
| forky, trixie | 1.19-1 | vulnerable |
| sid | 1.20-1 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[trixie] - libcrypt-dsa-perl <ignored> (Fix switches to Crypt::SysRandom not present in older releases)
[bookworm] - libcrypt-dsa-perl <ignored> (Fix switches to Crypt::SysRandom not present in older releases)
https://lists.security.metacpan.org/cve-announce/msg/40104301/
Fixed by: https://github.com/perl-Crypt-OpenPGP/Crypt-DSA/commit/43f2ad133bca76c57665f42eb0dc8042df54d3f1 (1.20)