First published: Fri Sep 13 2019(Updated: )
OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Reference: <a href="https://www.openssl.org/news/secadv/20190910.txt">https://www.openssl.org/news/secadv/20190910.txt</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | >=1.1.1<1.1.1c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1752095 is classified as high due to the potential for predictable randomness affecting cryptographic operations.
To fix REDHAT-BUG-1752095, upgrade OpenSSL to version 1.1.1d or later which addresses the issues with the random number generator.
OpenSSL versions from 1.1.1 up to but not including 1.1.1d are affected by REDHAT-BUG-1752095.
The implications of REDHAT-BUG-1752095 could involve compromised cryptographic keys, leading to security vulnerabilities in applications relying on OpenSSL.
Currently, there is no official workaround for REDHAT-BUG-1752095 and upgrading to the fixed version is recommended.