Bug 1918203 (CVE-2020-35733)
Summary: | CVE-2020-35733 erlang: accepts and trusts an invalid X.509 certificate chain | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | akarol, apevec, cmeyers, dbecker, dmetzger, gblomqui, gmccullo, gtanzill, jeckersb, jfrey, jhardy, jjoyce, jschluet, lemenkov, lhh, lpeer, mabashia, mburns, notting, obarenbo, plemenko, rhbugs, rjones, roliveri, rpetrell, sclewis, simaishi, slinaber, smallamp, smcdonal, s |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Erlang-OTP-23.2.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the OTP component of Erlang. The SSL application accepts and trusts invalid X.509 certificate chains. An attacker, able to create a fake certificate chain, could create a man-in-the-middle attack. The highest threat from this vulnerability is to data confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-02-09 22:09:45 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1918204, 1918205, 1918710, 1925515 | ||
Bug Blocks: | 1918206 |
Description
Marian Rehak
2021-01-20 09:38:12 UTC
Created erlang tracking bugs for this issue: Affects: epel-8 [bug 1918205] Affects: fedora-all [bug 1918204] Related upstream patches: https://github.com/erlang/otp/commit/a59f3c4d2be19343f43c46241d0f4e30dd5563de https://github.com/erlang/otp/commit/95222bb877515345d6716f3bc36139ab52211af0 https://github.com/erlang/otp/commit/d24a220c3b867caef83026ba31d2656366da4322 https://github.com/erlang/otp/commit/11a098cb0bcc30d7c424f01c60bfefd1deece287 https://github.com/erlang/otp/commit/c515e8d74fb92430c619eaa2dd00c89d94c6770a External References: https://erlang.org/pipermail/erlang-questions/2021-January/100357.html Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Statement: Red Hat CloudForms 5.10 ships affected erlang-OTP component but the product does not use it in a vulnerable way; therefore, the impact is low. The newer version of CloudForms 5.11 does not include the affected component. Red Hat Ansible Tower 3.6 ships 20.3.8.21 erlang-OTP component but this version never introduced the vulnerability, therefore is not affected. The newer versions of Red Hat Ansible Tower 3.7 and Red Hat Ansible Automation Platform which ships Ansible Tower 3.8 do not include the erlang dependency. All supported releases of Red Hat OpenStack Platform ship the affected Erlang component, however it is only used as a dependency for RabbitMQ and is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-35733 |