Bug 1918203 (CVE-2020-35733) - CVE-2020-35733 erlang: accepts and trusts an invalid X.509 certificate chain
Summary: CVE-2020-35733 erlang: accepts and trusts an invalid X.509 certificate chain
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-35733
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1918204 1918205 1918710 1925515
Blocks: 1918206
TreeView+ depends on / blocked
 
Reported: 2021-01-20 09:38 UTC by Marian Rehak
Modified: 2021-02-09 22:09 UTC (History)
31 users (show)

Fixed In Version: Erlang-OTP-23.2.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the OTP component of Erlang. The SSL application accepts and trusts invalid X.509 certificate chains. An attacker, able to create a fake certificate chain, could create a man-in-the-middle attack. The highest threat from this vulnerability is to data confidentiality.
Clone Of:
Environment:
Last Closed: 2021-02-09 22:09:45 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2021-01-20 09:38:12 UTC
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

Reference:

https://erlang.org/pipermail/erlang-questions/2021-January/100357.html

Comment 1 Marian Rehak 2021-01-20 09:38:55 UTC
Created erlang tracking bugs for this issue:

Affects: epel-8 [bug 1918205]
Affects: fedora-all [bug 1918204]

Comment 3 Yadnyawalk Tale 2021-01-21 12:48:56 UTC
External References:

https://erlang.org/pipermail/erlang-questions/2021-January/100357.html

Comment 7 Yadnyawalk Tale 2021-02-03 10:44:44 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 13 Nick Tait 2021-02-09 19:18:09 UTC
Statement:

Red Hat CloudForms 5.10 ships affected erlang-OTP component but the product does not use it in a vulnerable way; therefore, the impact is low. The newer version of CloudForms 5.11 does not include the affected component.

Red Hat Ansible Tower 3.6 ships 20.3.8.21 erlang-OTP component but this version never introduced the vulnerability, therefore is not affected. The newer versions of Red Hat Ansible Tower 3.7 and Red Hat Ansible Automation Platform which ships Ansible Tower 3.8 do not include the erlang dependency.

All supported releases of Red Hat OpenStack Platform ship the affected Erlang component, however it is only used as a dependency for RabbitMQ and is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.

Comment 15 Product Security DevOps Team 2021-02-09 22:09:45 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-35733


Note You need to log in before you can comment on or make changes to this bug.