{"id":"ALPINE-CVE-2019-1559","details":"If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).","modified":"2026-03-09T01:14:23.884609Z","published":"2019-02-27T23:29:00.277Z","upstream":["CVE-2019-1559"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2019-1559"}],"affected":[{"package":{"name":"openssl","ecosystem":"Alpine:v3.6","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2r-r0"}]}],"versions":["0.9.8i-r0","0.9.8j-r0","0.9.8k-r0","0.9.8k-r1","0.9.8k-r2","0.9.8k-r3","0.9.8k-r4","0.9.8k-r5","0.9.8k-r6","0.9.8k-r7","0.9.8l-r0","0.9.8l-r1","0.9.8m-r0","0.9.8n-r0","0.9.8n-r1","1.0.0-r0","1.0.0a-r0","1.0.0a-r1","1.0.0a-r2","1.0.0a-r3","1.0.0a-r4","1.0.0b-r0","1.0.0c-r0","1.0.0d-r0","1.0.0e-r0","1.0.0f-r0","1.0.0g-r0","1.0.0h-r0","1.0.1-r0","1.0.1a-r0","1.0.1b-r0","1.0.1c-r0","1.0.1c-r1","1.0.1c-r2","1.0.1c-r3","1.0.1d-r0","1.0.1d-r1","1.0.1e-r0","1.0.1e-r1","1.0.1e-r2","1.0.1e-r3","1.0.1e-r4","1.0.1e-r5","1.0.1e-r6","1.0.1e-r7","1.0.1f-r0","1.0.1g-r0","1.0.1g-r1","1.0.1g-r2","1.0.1g-r3","1.0.1h-r0","1.0.1i-r0","1.0.1i-r1","1.0.1i-r2","1.0.1i-r3","1.0.1j-r0","1.0.1k-r0","1.0.1l-r0","1.0.2-r0","1.0.2a-r0","1.0.2a-r1","1.0.2b-r0","1.0.2c-r0","1.0.2d-r0","1.0.2e-r0","1.0.2e-r1","1.0.2f-r0","1.0.2f-r1","1.0.2f-r2","1.0.2g-r0","1.0.2g-r1","1.0.2g-r2","1.0.2g-r3","1.0.2h-r0","1.0.2h-r1","1.0.2h-r2","1.0.2h-r3","1.0.2h-r4","1.0.2i-r0","1.0.2j-r0","1.0.2j-r1","1.0.2j-r2","1.0.2k-r0","1.0.2l-r0","1.0.2m-r0","1.0.2n-r0","1.0.2o-r0","1.0.2o-r1","1.0.2p-r0","1.0.2q-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2019-1559.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.7","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2r-r0"}]}],"versions":["0.9.8i-r0","0.9.8j-r0","0.9.8k-r0","0.9.8k-r1","0.9.8k-r2","0.9.8k-r3","0.9.8k-r4","0.9.8k-r5","0.9.8k-r6","0.9.8k-r7","0.9.8l-r0","0.9.8l-r1","0.9.8m-r0","0.9.8n-r0","0.9.8n-r1","1.0.0-r0","1.0.0a-r0","1.0.0a-r1","1.0.0a-r2","1.0.0a-r3","1.0.0a-r4","1.0.0b-r0","1.0.0c-r0","1.0.0d-r0","1.0.0e-r0","1.0.0f-r0","1.0.0g-r0","1.0.0h-r0","1.0.1-r0","1.0.1a-r0","1.0.1b-r0","1.0.1c-r0","1.0.1c-r1","1.0.1c-r2","1.0.1c-r3","1.0.1d-r0","1.0.1d-r1","1.0.1e-r0","1.0.1e-r1","1.0.1e-r2","1.0.1e-r3","1.0.1e-r4","1.0.1e-r5","1.0.1e-r6","1.0.1e-r7","1.0.1f-r0","1.0.1g-r0","1.0.1g-r1","1.0.1g-r2","1.0.1g-r3","1.0.1h-r0","1.0.1i-r0","1.0.1i-r1","1.0.1i-r2","1.0.1i-r3","1.0.1j-r0","1.0.1k-r0","1.0.1l-r0","1.0.2-r0","1.0.2a-r0","1.0.2a-r1","1.0.2b-r0","1.0.2c-r0","1.0.2d-r0","1.0.2e-r0","1.0.2e-r1","1.0.2f-r0","1.0.2f-r1","1.0.2f-r2","1.0.2g-r0","1.0.2g-r1","1.0.2g-r2","1.0.2g-r3","1.0.2h-r0","1.0.2h-r1","1.0.2h-r2","1.0.2h-r3","1.0.2h-r4","1.0.2i-r0","1.0.2j-r0","1.0.2j-r1","1.0.2j-r2","1.0.2k-r0","1.0.2l-r0","1.0.2m-r0","1.0.2n-r0","1.0.2o-r0","1.0.2o-r1","1.0.2p-r0","1.0.2q-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2019-1559.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.8","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2r-r0"}]}],"versions":["0.9.8i-r0","0.9.8j-r0","0.9.8k-r0","0.9.8k-r1","0.9.8k-r2","0.9.8k-r3","0.9.8k-r4","0.9.8k-r5","0.9.8k-r6","0.9.8k-r7","0.9.8l-r0","0.9.8l-r1","0.9.8m-r0","0.9.8n-r0","0.9.8n-r1","1.0.0-r0","1.0.0a-r0","1.0.0a-r1","1.0.0a-r2","1.0.0a-r3","1.0.0a-r4","1.0.0b-r0","1.0.0c-r0","1.0.0d-r0","1.0.0e-r0","1.0.0f-r0","1.0.0g-r0","1.0.0h-r0","1.0.1-r0","1.0.1a-r0","1.0.1b-r0","1.0.1c-r0","1.0.1c-r1","1.0.1c-r2","1.0.1c-r3","1.0.1d-r0","1.0.1d-r1","1.0.1e-r0","1.0.1e-r1","1.0.1e-r2","1.0.1e-r3","1.0.1e-r4","1.0.1e-r5","1.0.1e-r6","1.0.1e-r7","1.0.1f-r0","1.0.1g-r0","1.0.1g-r1","1.0.1g-r2","1.0.1g-r3","1.0.1h-r0","1.0.1i-r0","1.0.1i-r1","1.0.1i-r2","1.0.1i-r3","1.0.1j-r0","1.0.1k-r0","1.0.1l-r0","1.0.2-r0","1.0.2a-r0","1.0.2a-r1","1.0.2b-r0","1.0.2c-r0","1.0.2d-r0","1.0.2e-r0","1.0.2e-r1","1.0.2f-r0","1.0.2f-r1","1.0.2f-r2","1.0.2g-r0","1.0.2g-r1","1.0.2g-r2","1.0.2g-r3","1.0.2h-r0","1.0.2h-r1","1.0.2h-r2","1.0.2h-r3","1.0.2h-r4","1.0.2i-r0","1.0.2j-r0","1.0.2j-r1","1.0.2j-r2","1.0.2k-r0","1.0.2l-r0","1.0.2m-r0","1.0.2n-r0","1.0.2o-r0","1.0.2o-r1","1.0.2o-r2","1.0.2p-r0","1.0.2q-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2019-1559.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}