Weak Random Number Generation in wolfSSL After Fork Operations
CVE-2025-7394
7HIGH
What is CVE-2025-7394?
A flaw in the OpenSSL compatibility layer of wolfSSL has been identified, where the function RAND_poll() fails to perform correctly, leading to potentially predictable values when using RAND_bytes() following fork() operations. This issue affects applications that explicitly call RAND_bytes() post-fork. Although documentation warns against using RAND_bytes() with fork() without invoking RAND_poll(), wolfSSL's recent changes have adapted its behavior. The library’s Hash-DRBG is now designed to reseed when a new process is detected after a fork, addressing the vulnerability. Users are advised to upgrade to the latest version of wolfSSL to mitigate this risk.
Affected Version(s)
wolfSSL 5.8.0