CVE-2019-1549

Priority
Description
OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This
was intended to include protection in the event of a fork() system call in
order to ensure that the parent and child processes did not share the same
RNG state. However this protection was not being used in the default case.
A partial mitigation for this issue is that the output from a high
precision timer is mixed into the RNG state so the likelihood of a parent
and child process sharing state is significantly reduced. If an application
already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK
then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected
1.1.1-1.1.1c).
Notes
mdeslauronly affected 1.1.1
Package
Source: edk2 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (0~20191122.bd85bf54-2)
Ubuntu 20.10 (Groovy Gorilla):not-affected (0~20191122.bd85bf54-2)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (uses system openssl)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (uses system openssl)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (uses system openssl1.0)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (uses system openssl1.1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (uses system openssl1.1)
Package
Upstream:released (1.1.1d)
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.1.1-1ubuntu2.1~18.04.6)
Ubuntu 20.04 LTS (Focal Fossa):released (1.1.1d-2ubuntu1)
Ubuntu 20.10 (Groovy Gorilla):released (1.1.1d-2ubuntu1)
Patches:
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
More Information

Updated: 2020-09-09 22:50:29 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)