An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority. Reference: https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
Created erlang tracking bugs for this issue: Affects: epel-8 [bug 1918205] Affects: fedora-all [bug 1918204]
Related upstream patches: https://github.com/erlang/otp/commit/a59f3c4d2be19343f43c46241d0f4e30dd5563de https://github.com/erlang/otp/commit/95222bb877515345d6716f3bc36139ab52211af0 https://github.com/erlang/otp/commit/d24a220c3b867caef83026ba31d2656366da4322 https://github.com/erlang/otp/commit/11a098cb0bcc30d7c424f01c60bfefd1deece287 https://github.com/erlang/otp/commit/c515e8d74fb92430c619eaa2dd00c89d94c6770a
External References: https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Statement: Red Hat CloudForms 5.10 ships affected erlang-OTP component but the product does not use it in a vulnerable way; therefore, the impact is low. The newer version of CloudForms 5.11 does not include the affected component. Red Hat Ansible Tower 3.6 ships 20.3.8.21 erlang-OTP component but this version never introduced the vulnerability, therefore is not affected. The newer versions of Red Hat Ansible Tower 3.7 and Red Hat Ansible Automation Platform which ships Ansible Tower 3.8 do not include the erlang dependency. All supported releases of Red Hat OpenStack Platform ship the affected Erlang component, however it is only used as a dependency for RabbitMQ and is not exposed outside the management network. As this network is tightly-regulated to OpenStack administrators, the risk for abuse is significantly reduced.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-35733