CVE-2020-35733
Summary
| CVE | CVE-2020-35733 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-15 14:15:00 UTC |
| Updated | 2023-11-07 03:22:00 UTC |
| Description | An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Erlang Programming Language |
MISC |
www.erlang.org |
Product, Vendor Advisory |
| Releases · erlang/otp · GitHub |
MISC |
github.com |
Third Party Advisory |
| Patch Package OTP 23.2.2 Released |
CONFIRM |
erlang.org |
Mailing List, Release Notes, Vendor Advisory |
| [SECURITY] Fedora 33 Update: erlang-23.2.3-1.fc33 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 33 Update: erlang-23.2.3-1.fc33 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Erlang Programming Language |
MISC |
www.erlang.org |
Release Notes, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 501839 Alpine Linux Security Update for erlang
- 504713 Alpine Linux Security Update for erlang