ArchLinux: 202101-39: erlang: certificate verification bypass
Summary
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
Resolution
Upgrade to 23.2.2-1.
# pacman -Syu "erlang>=23.2.2-1"
The problem has been fixed upstream in version 23.2.2.
References
https://erlang.org/pipermail/erlang-questions/2021-January/100357.html https://github.com/erlang/otp/commit/a59f3c4d2be19343f43c46241d0f4e30dd5563de https://security.archlinux.org/CVE-2020-35733
Workaround
None.