DescriptionAn issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs980199

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)stretch1:19.2.1+dfsg-2+deb9u3fixed
stretch (security)1:19.2.1+dfsg-2+deb9u1fixed
bookworm, sid1:24.2+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsourcestretch(not affected)
erlangsourcebuster(not affected)


[buster] - erlang <not-affected> (Vulnerable code introduced later)
[stretch] - erlang <not-affected> (Vulnerable code introduced later)
Introduced in: (OTP-23.2)
Fixed by: (OTP-23.2.2)
Fixed by: (OTP-23.2.2)
Fixed by: (OTP-23.2.2)
Fixed by: (OTP-23.2.2)

Search for package or bug name: Reporting problems