CVE-2024-53846

NameCVE-2024-53846
DescriptionOTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang, and a set of design principles for Erlang programs. A regression was introduced into the ssl application of OTP starting at OTP-25.3.2.8, OTP-26.2, and OTP-27.0, resulting in a server or client verifying the peer when incorrect extended key usage is presented (i.e., a server will verify a client if they have server auth ext key usage and vice versa).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)bullseye1:23.2.6+dfsg-1+deb11u1fixed
bullseye (security)1:23.2.6+dfsg-1+deb11u2fixed
bookworm1:25.2.3+dfsg-1+deb12u3fixed
bookworm (security)1:25.2.3+dfsg-1+deb12u1fixed
forky, trixie1:27.3.4.1+dfsg-1fixed
sid1:27.3.4.3+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsourcebullseye(not affected)
erlangsourcebookworm(not affected)
erlangsource(unstable)1:27.2+dfsg-1

Notes

[bookworm] - erlang <not-affected> (Vulnerable code introduced later)
[bullseye] - erlang <not-affected> (Vulnerable code introduced later)
https://github.com/erlang/otp/security/advisories/GHSA-qw6r-qh9v-638v
Introduced with: https://github.com/erlang/otp/commit/e7cd7fc40973493096f1582ae9089d87a7e88991#diff-ad2e52bd3adefb3dc79ab09e6124161de02878ff04d0e27c09fa0d548f0e21a7 (OTP-25.3.2.8, OTP-26.2)

Search for package or bug name: Reporting problems