{"id":"JLSEC-2026-215","summary":"OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include...","details":"OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).","modified":"2026-04-27T19:02:52.470786375Z","published":"2026-04-27T18:33:55.942Z","upstream":["CVE-2019-1549","EUVD-2019-10106","GHSA-xmjp-8ccm-cf6h"],"database_specific":{"license":"CC-BY-4.0","sources":[{"database_specific":{"status":"Modified"},"published":"2019-09-10T17:15:11.813Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2019-1549","modified":"2024-11-21T04:36:48.343Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-1549","id":"CVE-2019-1549","imported":"2026-04-27T16:32:26.195Z"},{"published":"2022-05-24T16:55:53Z","url":"https://api.github.com/advisories/GHSA-xmjp-8ccm-cf6h","modified":"2024-04-04T01:55:03Z","html_url":"https://github.com/advisories/GHSA-xmjp-8ccm-cf6h","id":"GHSA-xmjp-8ccm-cf6h","imported":"2026-04-27T16:36:29.883Z"},{"published":"2019-09-10T16:58:35Z","url":"https://euvdservices.enisa.europa.eu/api/enisaid?id=EUVD-2019-10106","modified":"2024-09-16T22:56:57Z","html_url":"https://euvd.enisa.europa.eu/vulnerability/EUVD-2019-10106","id":"EUVD-2019-10106","imported":"2026-04-27T16:33:22.220Z"}]},"references":[{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be"},{"type":"WEB","url":"https://github.com/advisories/GHSA-xmjp-8ccm-cf6h"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-1549"},{"type":"WEB","url":"https://seclists.org/bugtraq/2019/Oct/1"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20190919-0002"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20190919-0002/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K44070243"},{"type":"WEB","url":"https://support.f5.com/csp/article/K44070243?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"WEB","url":"https://support.f5.com/csp/article/K44070243?utm_source=f5support&amp;utm_medium=RSS"},{"type":"WEB","url":"https://usn.ubuntu.com/4376-1"},{"type":"WEB","url":"https://usn.ubuntu.com/4376-1/"},{"type":"WEB","url":"https://www.debian.org/security/2019/dsa-4539"},{"type":"WEB","url":"https://www.openssl.org/news/secadv/20190910.txt"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"WEB","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}],"affected":[{"package":{"name":"OpenSSL_jll","ecosystem":"Julia","purl":"pkg:julia/OpenSSL_jll?uuid=458c3c95-2e84-50aa-8efc-19380b2a3a95"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.1.1+2"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-215.json"}}],"schema_version":"1.7.5"}