The branch master has been updated
       via  e6ce68d75408edac4a22e85dc3af43444bc7fefc (commit)
      from  e784301605e11bb68c60d0f8c8e0c0ce5520eb17 (commit)


- Log -----------------------------------------------------------------
commit e6ce68d75408edac4a22e85dc3af43444bc7fefc
Author: Richard Levitte <levi...@openssl.org>
Date:   Tue Jul 30 15:20:38 2019 +0200

    CVE-2019-1552 security advisory
    
    Reviewed-by: Mark J. Cox <m...@awe.com>
    Reviewed-by: Matt Caswell <m...@openssl.org>
    (Merged from https://github.com/openssl/web/pull/134)

-----------------------------------------------------------------------

Summary of changes:
 news/newsflash.txt       |  1 +
 news/secadv/20190730.txt | 68 +++++++++++++++++++++++++++++++++++++++
 news/vulnerabilities.xml | 83 +++++++++++++++++++++++++++++++++++++++++++++++-
 3 files changed, 151 insertions(+), 1 deletion(-)
 create mode 100644 news/secadv/20190730.txt

diff --git a/news/newsflash.txt b/news/newsflash.txt
index 7a47756..491bee5 100644
--- a/news/newsflash.txt
+++ b/news/newsflash.txt
@@ -4,6 +4,7 @@
 # Format is two fields, colon-separated; the first line is the column
 # headings.  URL paths must all be absolute.
 Date: Item
+30-Jul-2019: <a href="/news/secadv/20190730.txt">Security Advisory</a>: one 
low severity fix in Windows builds
 28-May-2019: OpenSSL 1.1.1c is now available, including bug and security fixes
 28-May-2019: OpenSSL 1.1.0k is now available, including bug and security fixes
 28-May-2019: OpenSSL 1.0.2s is now available, including bug fixes
diff --git a/news/secadv/20190730.txt b/news/secadv/20190730.txt
new file mode 100644
index 0000000..0714a04
--- /dev/null
+++ b/news/secadv/20190730.txt
@@ -0,0 +1,68 @@
+OpenSSL Security Advisory [30 July 2019]
+========================================
+
+Windows builds with insecure path defaults (CVE-2019-1552)
+==========================================================
+
+Severity: Low
+
+OpenSSL has internal defaults for a directory tree where it can find a
+configuration file as well as certificates used for verification in
+TLS.  This directory is most commonly referred to as OPENSSLDIR, and
+is configurable with the --prefix / --openssldir configuration options.
+
+For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets
+assume that resulting programs and libraries are installed in a
+Unix-like environment and the default prefix for program installation
+as well as for OPENSSLDIR should be '/usr/local'.
+
+However, mingw programs are Windows programs, and as such, find
+themselves looking at sub-directories of 'C:/usr/local', which may be
+world writable, which enables untrusted users to modify OpenSSL's
+default configuration, insert CA certificates, modify (or even
+replace) existing engine modules, etc.
+
+For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR
+on all Unix and Windows targets, including Visual C builds.  However,
+some build instructions for the diverse Windows targets on 1.0.2
+encourage you to specify your own --prefix.
+
+OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue.
+Due to the limited scope of affected deployments this has been
+assessed as low severity and therefore we are not creating new
+releases at this time.
+
+The mitigations are found in these commits:
+- For 1.1.1, commit 54aa9d51b09d67e90db443f682cface795f5af9e
+- For 1.1.0, commit e32bc855a81a2d48d215c506bdeb4f598045f7e9 and
+  b15a19c148384e73338aa7c5b12652138e35ed28
+- For 1.0.2, commit d333ebaf9c77332754a9d5e111e2f53e1de54fdd
+
+The 1.1.1 and 1.1.0 mitigation set more appropriate defaults for
+mingw, while the 1.0.2 mitigation documents the issue and provides
+enhanced examples.
+
+This issue was reported by Rich Mirth.  The fix was developed by
+Richard Levitte from the OpenSSL development team.  It was reported to
+OpenSSL on 9th Jun 2019.
+
+Note
+=====
+
+OpenSSL 1.0.2 and 1.1.0 are currently only receiving security updates.
+Support for 1.0.2 will end on 31st December 2019. Support for 1.1.0
+will end on 11th September 2019. Users of these versions should
+upgrade to OpenSSL 1.1.1.
+
+
+Referenses
+==========
+
+URL for this Security Advisory:
+https://www.openssl.org/news/secadv/20190730.txt
+
+Note: the online version of the advisory may be updated with additional details
+over time.
+
+For details of OpenSSL severity classifications please see:
+https://www.openssl.org/policies/secpolicy.html
diff --git a/news/vulnerabilities.xml b/news/vulnerabilities.xml
index f9949ce..e66f6d8 100644
--- a/news/vulnerabilities.xml
+++ b/news/vulnerabilities.xml
@@ -7,7 +7,88 @@
 
 <!-- The updated attribute should be the same as the first public issue,
      unless an old entry was updated. -->
-<security updated="20190528">
+<security updated="20190730">
+  <issue public="20190730">
+    <impact severity="Low"/>
+    <cve name="2019-1552"/>
+    <affects base="1.1.1" version="1.1.1"/>
+    <affects base="1.1.1" version="1.1.1a"/>
+    <affects base="1.1.1" version="1.1.1b"/>
+    <affects base="1.1.1" version="1.1.1c"/>
+    <affects base="1.1.0" version="1.1.0"/>
+    <affects base="1.1.0" version="1.1.0a"/>
+    <affects base="1.1.0" version="1.1.0b"/>
+    <affects base="1.1.0" version="1.1.0c"/>
+    <affects base="1.1.0" version="1.1.0d"/>
+    <affects base="1.1.0" version="1.1.0e"/>
+    <affects base="1.1.0" version="1.1.0f"/>
+    <affects base="1.1.0" version="1.1.0g"/>
+    <affects base="1.1.0" version="1.1.0h"/>
+    <affects base="1.1.0" version="1.1.0i"/>
+    <affects base="1.1.0" version="1.1.0j"/>
+    <affects base="1.1.0" version="1.1.0k"/>
+    <affects base="1.0.2" version="1.0.2"/>
+    <affects base="1.0.2" version="1.0.2a"/>
+    <affects base="1.0.2" version="1.0.2b"/>
+    <affects base="1.0.2" version="1.0.2c"/>
+    <affects base="1.0.2" version="1.0.2d"/>
+    <affects base="1.0.2" version="1.0.2e"/>
+    <affects base="1.0.2" version="1.0.2f"/>
+    <affects base="1.0.2" version="1.0.2g"/>
+    <affects base="1.0.2" version="1.0.2h"/>
+    <affects base="1.0.2" version="1.0.2i"/>
+    <affects base="1.0.2" version="1.0.2j"/>
+    <affects base="1.0.2" version="1.0.2k"/>
+    <affects base="1.0.2" version="1.0.2l"/>
+    <affects base="1.0.2" version="1.0.2m"/>
+    <affects base="1.0.2" version="1.0.2n"/>
+    <affects base="1.0.2" version="1.0.2o"/>
+    <affects base="1.0.2" version="1.0.2p"/>
+    <affects base="1.0.2" version="1.0.2q"/>
+    <affects base="1.0.2" version="1.0.2r"/>
+    <affects base="1.0.2" version="1.0.2s"/>
+    <fixed base="1.1.1" version="1.1.1d" date="20190706">
+      <git hash="54aa9d51b09d67e90db443f682cface795f5af9e"/>
+    </fixed>
+    <fixed base="1.1.0" version="1.1.0l" date="20190727">
+      <git hash="e32bc855a81a2d48d215c506bdeb4f598045f7e9"/>
+      <git hash="b15a19c148384e73338aa7c5b12652138e35ed28"/>
+    </fixed>
+    <fixed base="1.0.2" version="1.0.2t" date="20190725">
+      <git hash="d333ebaf9c77332754a9d5e111e2f53e1de54fdd"/>
+    </fixed>
+    <problemtype>Insecure defaults</problemtype>
+    <title>Windows builds with insecure path defaults</title>
+    <description>
+      OpenSSL has internal defaults for a directory tree where it can find a
+      configuration file as well as certificates used for verification in
+      TLS.  This directory is most commonly referred to as OPENSSLDIR, and
+      is configurable with the --prefix / --openssldir configuration options.
+
+      For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets
+      assume that resulting programs and libraries are installed in a
+      Unix-like environment and the default prefix for program installation
+      as well as for OPENSSLDIR should be '/usr/local'.
+
+      However, mingw programs are Windows programs, and as such, find
+      themselves looking at sub-directories of 'C:/usr/local', which may be
+      world writable, which enables untrusted users to modify OpenSSL's
+      default configuration, insert CA certificates, modify (or even
+      replace) existing engine modules, etc.
+
+      For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR
+      on all Unix and Windows targets, including Visual C builds.  However,
+      some build instructions for the diverse Windows targets on 1.0.2
+      encourage you to specify your own --prefix.
+
+      OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue.
+      Due to the limited scope of affected deployments this has been
+      assessed as low severity and therefore we are not creating new
+      releases at this time.
+    </description>
+    <advisory url="/news/secadv/20190730.txt"/>
+    <reported source="Rich Mirch"/>
+  </issue>
   <issue public="20190306">
     <impact severity="Low"/>
     <cve name="2019-1543"/>

Reply via email to