Arch Linux Security Advisory ASA-202101-39
=========================================
Severity: High
Date    : 2021-01-20
CVE-ID  : CVE-2020-35733
Package : erlang
Type    : certificate verification bypass
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1457

Summary
======
The package erlang before version 23.2.2-1 is vulnerable to certificate
verification bypass.

Resolution
=========
Upgrade to 23.2.2-1.

# pacman -Syu "erlang>=23.2.2-1"

The problem has been fixed upstream in version 23.2.2.

Workaround
=========
None.

Description
==========
An issue was discovered in Erlang/OTP before 23.2.2. The ssl
application 10.2 accepts and trusts an invalid X.509 certificate chain
to a trusted root Certification Authority.

Impact
=====
The library would accept invalid certificates.

References
=========
https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
https://github.com/erlang/otp/commit/a59f3c4d2be19343f43c46241d0f4e30dd5563de
https://security.archlinux.org/CVE-2020-35733

ArchLinux: 202101-39: erlang: certificate verification bypass

January 28, 2021

Summary

An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.

Resolution

Upgrade to 23.2.2-1. # pacman -Syu "erlang>=23.2.2-1"
The problem has been fixed upstream in version 23.2.2.

References

https://erlang.org/pipermail/erlang-questions/2021-January/100357.html https://github.com/erlang/otp/commit/a59f3c4d2be19343f43c46241d0f4e30dd5563de https://security.archlinux.org/CVE-2020-35733

Severity
Package : erlang
Type : certificate verification bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-1457

Workaround

None.

Related News