DEBIAN-CVE-2025-7394

Source
https://security-tracker.debian.org/tracker/CVE-2025-7394
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7394.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-7394
Upstream
Published
2025-07-18T23:15:23.470Z
Modified
2025-12-04T10:01:24.439896Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the OpenSSL compatibility layer implementation, the function RANDpoll() was not behaving as expected and leading to the potential for predictable values returned from RANDbytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RANDbytes() and doing fork() operations. This only affects applications explicitly calling RANDbytes() after fork() and does not affect any internal TLS operations. Although RANDbytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RANDpoll(), an additional code change was also made in wolfSSL to make RANDbytes() behave similar to OpenSSL after a fork() call without calling RANDpoll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.

References

Affected packages

Debian:11 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.6.0-3
4.6.0+p1-0+deb11u1
4.6.0+p1-0+deb11u2
5.*
5.0.0-1~bpo11+1
5.0.0-1
5.1.1-1~bpo11+1
5.1.1-1
5.2.0-1
5.2.0-2~bpo11+1
5.2.0-2
5.5.3-1
5.5.3-2
5.5.3-3~bpo11+1
5.5.3-3
5.5.4-1
5.5.4-2~bpo11+1
5.5.4-2
5.5.4-2.1
5.6.4-1
5.6.4-2
5.6.6-1
5.6.6-1.1
5.6.6-1.2
5.6.6-1.3~exp1
5.6.6-1.3
5.7.0-0.1
5.7.0-0.2
5.7.0-0.3
5.7.2-0.1
5.7.2-0.2
5.7.2-0.3
5.7.2-0.4
5.8.2-1
5.8.2-1.1
5.8.2-1.2
5.8.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7394.json"

Debian:12 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.5.4-2+deb12u2

Affected versions

5.*
5.5.4-2
5.5.4-2+deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7394.json"

Debian:13 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.2-0.1+deb13u1

Affected versions

5.*
5.7.2-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7394.json"

Debian:14 / wolfssl

Package

Name
wolfssl
Purl
pkg:deb/debian/wolfssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.7.2-0.4

Affected versions

5.*
5.7.2-0.1
5.7.2-0.2
5.7.2-0.3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7394.json"