{"id":"UBUNTU-CVE-2019-1549","details":"OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).","modified":"2026-04-22T12:11:35.510975Z","published":"2019-09-10T17:15:00Z","related":["USN-4376-1"],"upstream":["CVE-2019-1549"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-1549"},{"type":"REPORT","url":"https://www.openssl.org/news/secadv/20190910.txt"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4376-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-1549"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.1.1-1ubuntu2.1~18.04.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.1-1ubuntu2.1~18.04.6"}]}],"versions":["1.0.2g-1ubuntu13","1.0.2g-1ubuntu14","1.0.2n-1ubuntu1","1.1.0g-2ubuntu1","1.1.0g-2ubuntu2","1.1.0g-2ubuntu3","1.1.0g-2ubuntu4","1.1.0g-2ubuntu4.1","1.1.0g-2ubuntu4.3","1.1.1-1ubuntu2.1~18.04.1","1.1.1-1ubuntu2.1~18.04.2","1.1.1-1ubuntu2.1~18.04.3","1.1.1-1ubuntu2.1~18.04.4","1.1.1-1ubuntu2.1~18.04.5"],"ecosystem_specific":{"binaries":[{"binary_name":"libssl1.1","binary_version":"1.1.1-1ubuntu2.1~18.04.6"},{"binary_name":"openssl","binary_version":"1.1.1-1ubuntu2.1~18.04.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-1549.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}