[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #31383 [Applications/Tor Browser]: OpenSSL CVE-2019-1552



#31383: OpenSSL CVE-2019-1552
--------------------------------------+-----------------------------------
 Reporter:  cypherpunks               |          Owner:  tbb-team
     Type:  defect                    |         Status:  needs_information
 Priority:  High                      |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Major                     |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+-----------------------------------

Comment (by gk):

 Replying to [comment:9 cypherpunks]:
 > > What's wrong with those paths?
 > They are hard-coded. That's a main bug and vulnerability, in general.
 > Also they are not allowed for your app-local OpenSSL.

 Where is the vulnerability here and why does it matter whether those paths
 are allowed for the app- local OpenSSL?

 > > They should not be user-writable. I mean that's actually part of the
 OpenSSL fix for that CVE. If that's wrong it seems to me a bug against
 OpenSSL should get filed.
 > Yes.
 > > Are you claiming `C:\Program Files` and `C:\Program Files (x86)` are
 user-writable?
 > `C:\Program Files (x86)` doesn't exist in 32-bit Windows.

 Yeah, I just found
 https://github.com/openssl/openssl/pull/9400#issuecomment-517784572.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31383#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs