[tbb-bugs] #31383 [Applications/Tor Browser]: OpenSSL CVE-2019-1552
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Oct 2 10:33:22 UTC 2019
#31383: OpenSSL CVE-2019-1552
--------------------------------------+--------------------------
Reporter: cypherpunks | Owner: tbb-team
Type: defect | Status: closed
Priority: High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution: invalid
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Changes (by gk):
* status: needs_information => closed
* resolution: => invalid
Comment:
Replying to [comment:16 boklm]:
> Replying to [comment:15 cypherpunks]:
> > > Hardcoding any path (like suggested with C:\Windows or a path below
it in comment:6) like e.g. the curl devs did does not do the trick
according to your line of reasoning.
> > How to teach OpenSSL to dance? Make it compatible with app-local
installation, no?
> > For Tor Browser, the best option is to disable everything related to
those paths as it doesn't use them. But you can change them to
`C:\Windows\Tor Browser` as a so-so workaround.
>
> Reading https://daniel.haxx.se/blog/2019/06/24/openssl-engine-code-
injection-in-curl/ it seems that the issue can happen when a program loads
the openssl configuration file from the default path, which is done with
the openssl function `CONF_modules_load_file`. However we don't call this
function in tor, so it doesn't look like we are vulnerable to this issue.
Nice find! So, I think we are actually done here.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31383#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tbb-bugs
mailing list