DescriptionAn issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs980199

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)buster1:21.2.6+dfsg-1fixed
buster (security)1:22.2.7+dfsg-1+deb10u1fixed
bookworm, sid, trixie1:25.2.3+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsourcestretch(not affected)
erlangsourcebuster(not affected)


[buster] - erlang <not-affected> (Vulnerable code introduced later)
[stretch] - erlang <not-affected> (Vulnerable code introduced later)
Introduced in: (OTP-23.2)
Fixed by: (OTP-23.2.2)
Fixed by: (OTP-23.2.2)
Fixed by: (OTP-23.2.2)
Fixed by: (OTP-23.2.2)

Search for package or bug name: Reporting problems