Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to address OpenSSL vulnerabilities in your apps #40

Closed
dolar2006 opened this issue Apr 26, 2016 · 5 comments
Closed

How to address OpenSSL vulnerabilities in your apps #40

dolar2006 opened this issue Apr 26, 2016 · 5 comments

Comments

@dolar2006
Copy link

This information is intended for developers of apps statically linking against a version of OpenSSL that precedes 1.02f/1.01r. These versions contain security vulnerabilities.

Please migrate your app(s) to OpenSSL 1.02f/1.01r or higher as soon as possible and increment the version number of the upgraded APK. Beginning July 11, 2016, Google Play will block publishing of any new apps or updates that use older versions of OpenSSL.

The vulnerabilities were addressed in OpenSSL 1.02f/1.01r. The latest versions OpenSSL can be downloaded here. To confirm your OpenSSL version, you can do a grep search for ($ unzip -p YourApp.apk | strings | grep "OpenSSL").

If you’re using a 3rd party library that bundles OpenSSL, you’ll need to upgrade it to a version that bundles OpenSSL 1.02f/1.01r or higher.

To confirm you’ve upgraded correctly, submit the updated version to the Developer Console and check back after five hours. If the app hasn’t been correctly upgraded, we will display a warning.

The vulnerabilities include "logjam" and CVE-2015-3194. The Logjam attack allows a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade cryptography. This allows the attacker to read and modify any data passed over the connection. Details about other vulnerabilities are available here. For other technical questions, you can post to Stack Overflow and use the tags “android-security” and “OpenSSL.”

While these issues may not affect every app that uses OpenSSL versions prior to 1.02f/1.01r, it's best to stay up to date on all security patches. Apps with vulnerabilities that expose users to risk of compromise may be considered in violation of our Malicious Behavior policy and section 4.4 of the Developer Distribution Agreement.

Before publishing apps, please ensure they are compliant with the Developer Distribution Agreement and Content Policy. If you feel we have sent you an OpenSSL warning in error, contact our support team through the Google Play Developer Help Center.

@n8fr8
Copy link
Member

n8fr8 commented Apr 26, 2016

Why are you pretending to be someone from Google? Also, this issue isn't relevant to us since the way that Tor uses OpenSSL is not affected by logjam.

@n8fr8 n8fr8 closed this as completed Apr 26, 2016
@dolar2006
Copy link
Author

This information appeared in the Developer Console. In your application using OpenSSL is vulnerable

@n8fr8
Copy link
Member

n8fr8 commented Apr 28, 2016

What do you mean the Developer Console? Who's developer console?

As I noted, the way Tor uses OpenSSL is different than most apps, and it is not vulnerable.

@dolar2006
Copy link
Author

what version of OpenSSL is used in your application?

1.02f / 1.01r vulnerable.
These versions contain a security vulnerability.

@n8fr8
Copy link
Member

n8fr8 commented Apr 28, 2016

I am not saying there isn't a vulnerability, but that Tor is not a typical openssl client, and that it is not susceptible to this flaw.

https://lists.torproject.org/pipermail/tor-dev/2015-May/008868.html

Regardless, we will likely be updating OpenSSL to the latest release in our next version.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants