UBUNTU-CVE-2025-7394

Source
https://ubuntu.com/security/CVE-2025-7394
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-7394
Upstream
Published
2025-07-18T23:15:00Z
Modified
2026-01-20T18:45:47.600448Z
Severity
  • 7.0 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In the OpenSSL compatibility layer implementation, the function RANDpoll() was not behaving as expected and leading to the potential for predictable values returned from RANDbytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RANDbytes() and doing fork() operations. This only affects applications explicitly calling RANDbytes() after fork() and does not affect any internal TLS operations. Although RANDbytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RANDpoll(), an additional code change was also made in wolfSSL to make RANDbytes() behave similar to OpenSSL after a fork() call without calling RANDpoll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.

References

Affected packages

Ubuntu:16.04:LTS
wolfssl

Package

Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@3.4.8+dfsg-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.4.8+dfsg-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libcyassl5",
            "binary_version": "3.4.8+dfsg-1"
        },
        {
            "binary_name": "libwolfssl-dev",
            "binary_version": "3.4.8+dfsg-1"
        },
        {
            "binary_name": "libwolfssl0",
            "binary_version": "3.4.8+dfsg-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json"
Ubuntu:18.04:LTS
wolfssl

Package

Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@3.13.0+dfsg-1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.10.2+dfsg-2
3.12.0+dfsg-1
3.12.2+dfsg-1
3.13.0+dfsg-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libwolfssl-dev",
            "binary_version": "3.13.0+dfsg-1"
        },
        {
            "binary_name": "libwolfssl15",
            "binary_version": "3.13.0+dfsg-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json"
Ubuntu:20.04:LTS
wolfssl

Package

Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@4.3.0+dfsg-2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.1.0+dfsg-2
4.2.0+dfsg-1
4.2.0+dfsg-2
4.2.0+dfsg-3
4.3.0+dfsg-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libwolfssl-dev",
            "binary_version": "4.3.0+dfsg-2"
        },
        {
            "binary_name": "libwolfssl24",
            "binary_version": "4.3.0+dfsg-2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json"
Ubuntu:22.04:LTS
wolfssl

Package

Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@5.2.0-2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*
4.6.0-3
5.*
5.0.0-1
5.1.1-1
5.2.0-1
5.2.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libwolfssl-dev",
            "binary_version": "5.2.0-2"
        },
        {
            "binary_name": "libwolfssl32",
            "binary_version": "5.2.0-2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json"
Ubuntu:24.04:LTS
wolfssl

Package

Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@5.6.6-1.3build1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.5.4-2
5.5.4-2.1
5.6.4-2
5.6.6-1.2
5.6.6-1.3
5.6.6-1.3build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libwolfssl-dev",
            "binary_version": "5.6.6-1.3build1"
        },
        {
            "binary_name": "libwolfssl42t64",
            "binary_version": "5.6.6-1.3build1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json"
Ubuntu:25.10
wolfssl

Package

Name
wolfssl
Purl
pkg:deb/ubuntu/wolfssl@5.7.2-0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.7.2-0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libwolfssl-dev",
            "binary_version": "5.7.2-0.1"
        },
        {
            "binary_name": "libwolfssl42t64",
            "binary_version": "5.7.2-0.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-7394.json"