First published: Mon May 08 2023(Updated: )
It was discovered that Erlang did not properly implement TLS client certificate validation during the TLS handshake. A remote attacker could use this issue to bypass client authentication.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/erlang-ssl | <1:24.3.4.1+dfsg-1ubuntu0.1 | 1:24.3.4.1+dfsg-1ubuntu0.1 |
Ubuntu Linux | =22.10 | |
All of | ||
ubuntu/erlang | <1:24.3.4.1+dfsg-1ubuntu0.1 | 1:24.3.4.1+dfsg-1ubuntu0.1 |
Ubuntu Linux | =22.10 | |
All of | ||
ubuntu/erlang-ssl | <1:24.2.1+dfsg-1ubuntu0.1 | 1:24.2.1+dfsg-1ubuntu0.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/erlang | <1:24.2.1+dfsg-1ubuntu0.1 | 1:24.2.1+dfsg-1ubuntu0.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/erlang-ssl | <1:22.2.7+dfsg-1ubuntu0.2 | 1:22.2.7+dfsg-1ubuntu0.2 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/erlang | <1:22.2.7+dfsg-1ubuntu0.2 | 1:22.2.7+dfsg-1ubuntu0.2 |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6059-1 is rated as high due to the potential for remote attackers to bypass client authentication.
To fix USN-6059-1, update the affected packages 'erlang-ssl' and 'erlang' to the recommended versions provided by your Ubuntu repository.
USN-6059-1 affects users of Ubuntu 22.10, 22.04, and 20.04 with specific versions of the 'erlang-ssl' and 'erlang' packages.
The vulnerability in USN-6059-1 is caused by Erlang's improper implementation of TLS client certificate validation during the TLS handshake.
USN-6059-1 can facilitate attacks where a remote attacker successfully bypasses client authentication, potentially compromising secure communication.