First published: Tue Sep 10 2019(Updated: )
Last updated 24 July 2024
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el6 | 0:1.6.3-86.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el6 | 0:1.0.6-21.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el6 | 0:2.4.37-52.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el6 | 1:1.1.1c-16.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el7 | 0:1.6.3-86.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el7 | 0:1.0.6-21.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el7 | 0:2.4.37-52.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el7 | 1:1.1.1c-16.jbcs.el7 |
redhat/openssl | <1:1.1.1c-15.el8 | 1:1.1.1c-15.el8 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.0-2 | |
OpenSSL libcrypto | >=1.1.1<=1.1.1c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-1549 is a vulnerability in OpenSSL 1.1.1 that affects the random number generator (RNG).
CVE-2019-1549 has a severity rating of 5.3, which is considered medium.
CVE-2019-1549 affects OpenSSL 1.1.1 by enabling the parent and child processes to share the same RNG state during a fork() system call, which poses a security risk.
To remediate CVE-2019-1549, update OpenSSL to version 1.1.1c or higher.
You can find more information about CVE-2019-1549 in the OpenSSL security advisory and related references.