Bug 1918203 (CVE-2020-35733)

Summary: CVE-2020-35733 erlang: accepts and trusts an invalid X.509 certificate chain
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: akarol, apevec, cmeyers, dbecker, dmetzger, gblomqui, gmccullo, gtanzill, jeckersb, jfrey, jhardy, jjoyce, jschluet, lemenkov, lhh, lpeer, mabashia, mburns, notting, obarenbo, plemenko, rhbugs, rjones, roliveri, rpetrell, sclewis, simaishi, slinaber, smallamp, smcdonal, s
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Erlang-OTP-23.2.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the OTP component of Erlang. The SSL application accepts and trusts invalid X.509 certificate chains. An attacker, able to create a fake certificate chain, could create a man-in-the-middle attack. The highest threat from this vulnerability is to data confidentiality.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-02-09 22:09:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1918204, 1918205, 1918710, 1925515    
Bug Blocks: 1918206    

Description Marian Rehak 2021-01-20 09:38:12 UTC
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

Reference:

https://erlang.org/pipermail/erlang-questions/2021-January/100357.html

Comment 1 Marian Rehak 2021-01-20 09:38:55 UTC
Created erlang tracking bugs for this issue:

Affects: epel-8 [bug 1918205]
Affects: fedora-all [bug 1918204]

Comment 3 Yadnyawalk Tale 2021-01-21 12:48:56 UTC
External References:

https://erlang.org/pipermail/erlang-questions/2021-January/100357.html

Comment 7 Yadnyawalk Tale 2021-02-03 10:44:44 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 13 Nick Tait 2021-02-09 19:18:09 UTC
Statement:

Red Hat CloudForms 5.10 ships affected erlang-OTP component but the product does not use it in a vulnerable way; therefore, the impact is low. The newer version of CloudForms 5.11 does not include the affected component.

Red Hat Ansible Tower 3.6 ships 20.3.8.21 erlang-OTP component but this version never introduced the vulnerability, therefore is not affected. The newer versions of Red Hat Ansible Tower 3.7 and Red Hat Ansible Automation Platform which ships Ansible Tower 3.8 do not include the erlang dependency.

All supported releases of Red Hat OpenStack Platform ship the affected Erlang component, however it is only used as a dependency for RabbitMQ and is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.

Comment 15 Product Security DevOps Team 2021-02-09 22:09:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-35733