Bug 1839815 (CVE-2020-12872)

Summary: CVE-2020-12872 yaws: yaws_config.erl loads obsolete TLS ciphers
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: devel, extras-orphan, filip, lkundrak
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-05-25 21:15:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1839816, 1839817    
Bug Blocks:    

Description Pedro Sampaio 2020-05-25 16:26:51 UTC
yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks. 

References:

https://github.com/erlyaws/yaws/blob/c0fd79f17d52628fcec527da7fa3e788c283c445/src/yaws_config.erl#L2068-L2075
https://github.com/erlyaws/yaws/releases
https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70
https://sweet32.info/

Comment 1 Pedro Sampaio 2020-05-25 16:27:21 UTC
Created yaws tracking bugs for this issue:

Affects: epel-7 [bug 1839817]
Affects: fedora-all [bug 1839816]

Comment 2 Product Security DevOps Team 2020-05-25 21:15:22 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.