[manjaro-security] [ASA-202101-39] erlang: certificate verification bypass
Morten Linderud via arch-security
arch-security at lists.archlinux.org
Thu Jan 28 23:00:46 CET 2021
Arch Linux Security Advisory ASA-202101-39
==========================================
Severity: High
Date : 2021-01-20
CVE-ID : CVE-2020-35733
Package : erlang
Type : certificate verification bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-1457
Summary
=======
The package erlang before version 23.2.2-1 is vulnerable to certificate
verification bypass.
Resolution
==========
Upgrade to 23.2.2-1.
# pacman -Syu "erlang>=23.2.2-1"
The problem has been fixed upstream in version 23.2.2.
Workaround
==========
None.
Description
===========
An issue was discovered in Erlang/OTP before 23.2.2. The ssl
application 10.2 accepts and trusts an invalid X.509 certificate chain
to a trusted root Certification Authority.
Impact
======
The library would accept invalid certificates.
References
==========
https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
https://github.com/erlang/otp/commit/a59f3c4d2be19343f43c46241d0f4e30dd5563de
https://security.archlinux.org/CVE-2020-35733
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210128/7b478d00/attachment.sig>
More information about the manjaro-security
mailing list