Package: release.debian.org
Severity: normal
Tags: stretch
User: release.debian....@packages.debian.org
Usertags: pu

Hi release team!

Recently, a weak ciphers vulnerability was discovered in the Yaws web server,
and reported as CVE-2020-12872 (see [1] and [2]).
It turnes out that Yaws uses the default ciphers provided by Erlang, so I
think it's better to fix this bug there. If we consider only Erlang packages
in stretch, buster, bullseye/sid then only the version in stretch is
vulnerable, so I'd like to propose an update for it.

The proposed patch is attached. It's a minimal patch which jusr removes the
3DES based ciphers from the offered list for TLS v1.0. The later Erlang
versions do just that - remove these ciphers from the list.

If the patch is okay then I'll upload the fixed version.

[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12872
[2] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961422

-- System Information:
Debian Release: 10.4
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'proposed-updates'), (500, 
'oldoldstable'), (500, 'stable'), (500, 'oldstable'), (1, 'experimental'), (1, 
'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-9-amd64 (SMP w/12 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru erlang-19.2.1+dfsg/debian/changelog 
erlang-19.2.1+dfsg/debian/changelog
--- erlang-19.2.1+dfsg/debian/changelog 2019-02-09 01:28:34.000000000 +0300
+++ erlang-19.2.1+dfsg/debian/changelog 2020-05-26 11:30:58.000000000 +0300
@@ -1,3 +1,10 @@
+erlang (1:19.2.1+dfsg-2+deb9u3) stretch; urgency=medium
+
+  * Applied a patch which fixes CVE-2020-12872 vulnerability revealed
+    for the Yaws web server (TLS server offers weak ciphers for TLS 1.0).
+
+ -- Sergei Golovan <sgolo...@debian.org>  Tue, 26 May 2020 11:30:58 +0300
+
 erlang (1:19.2.1+dfsg-2+deb9u2) stretch; urgency=medium
 
   [ Andreas Beckmann ]
diff -Nru erlang-19.2.1+dfsg/debian/patches/cve-2020-12872.patch 
erlang-19.2.1+dfsg/debian/patches/cve-2020-12872.patch
--- erlang-19.2.1+dfsg/debian/patches/cve-2020-12872.patch      1970-01-01 
03:00:00.000000000 +0300
+++ erlang-19.2.1+dfsg/debian/patches/cve-2020-12872.patch      2020-05-26 
11:30:58.000000000 +0300
@@ -0,0 +1,25 @@
+From: Sergei Golovan <sgolo...@debian.org>
+Subject: Patch removes ciphers which are now considered weak
+ from the default TLS ciphers list. The vulnerability was found
+ in the Yaws web server and described as CVE-2020-12872.
+ It is fixed in the later Erlang releases.
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961422
+Forwarded: no
+
+--- a/lib/ssl/src/tls_v1.erl
++++ b/lib/ssl/src/tls_v1.erl
+@@ -204,14 +204,6 @@
+       ?TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
+       ?TLS_RSA_WITH_AES_256_CBC_SHA,
+ 
+-      ?TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
+-      ?TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
+-      ?TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
+-      ?TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
+-      ?TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
+-      ?TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
+-      ?TLS_RSA_WITH_3DES_EDE_CBC_SHA,
+-
+       ?TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
+       ?TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
+       ?TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
diff -Nru erlang-19.2.1+dfsg/debian/patches/series 
erlang-19.2.1+dfsg/debian/patches/series
--- erlang-19.2.1+dfsg/debian/patches/series    2017-03-22 15:31:29.000000000 
+0300
+++ erlang-19.2.1+dfsg/debian/patches/series    2020-05-26 11:30:58.000000000 
+0300
@@ -12,3 +12,4 @@
 x32.patch
 cve-2016-10253.patch
 cve-2017-1000385.patch
+cve-2020-12872.patch

Reply via email to