Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
glibc's Random Number Generator May Generate Predictable Numbers After Forks
CVE-2025-0577
Summary
The getrandom and arc4random functions in glibc may produce predictable random numbers if used after a process is forked, which can lead to security issues. This affects systems using these functions to generate random numbers. To mitigate this, consider updating to a glibc version that addresses this issue or implementing alternative random number generation methods.
Original title
An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, whic...
Original description
An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a call to any of these functions.
nvd CVSS3.1
4.8
Vulnerability type
CWE-331
Published: 18 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026