CVE-2019-1549

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
opensslCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
VendorProductVersion
opensslopenssl
1.1.1 ≤
𝑥
≤ 1.1.1c
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
stretch
not-affected
jessie
not-affected
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
ignored
disco
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne
nodejs
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl
hirsute
Fixed 1.1.1d-2ubuntu1
released
groovy
Fixed 1.1.1d-2ubuntu1
released
focal
Fixed 1.1.1d-2ubuntu1
released
eoan
Fixed 1.1.1c-1ubuntu4.1
released
disco
ignored
bionic
Fixed 1.1.1-1ubuntu2.1~18.04.6
released
xenial
not-affected
trusty
not-affected
openssl1.0
hirsute
dne
groovy
dne
focal
dne
eoan
dne
disco
dne
bionic
not-affected
xenial
dne
trusty
dne
References