Source: erlang Version: 1:23.2.1+dfsg-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for erlang. CVE-2020-35733[0]: | An issue was discovered in Erlang/OTP before 23.2.2. The ssl | application 10.2 accepts and trusts an invalid X.509 certificate chain | to a trusted root Certification Authority. It is specific to OTP-23.2, see the security-tracker information. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-35733 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35733 [1] https://erlang.org/pipermail/erlang-questions/2021-January/100357.html Regards, Salvatore