Nп/п : 82 из 100
 От   : Alex Murray                         2:5075/128        08 май 23 20:25:20
 К    : All                                                   08 май 23 14:06:03
 Тема : [USN-6059-1] Erlang vulnerability
----------------------------------------------------------------------------------
                                                                                 
@MSGID:
<87y1lzdrdz.fsf@graphene.mail-host-address-is-not-set> 06739116
@REPLYADDR Alex Murray
<alex.murray@canonical.com>
@REPLYTO 2:5075/128 Alex Murray
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<87y1lzdrdz.fsf@graphene.mail-host-address-is-not-set>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============0619746252796902304=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: 0930
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6059-1
May 08, 2023

erlang vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Erlang could allow unintended access to network services.

Software Description:
- erlang: Concurrent, real-time, distributed functional language

Details:

It was discovered that Erlang did not properly implement TLS client
certificate validation during the TLS handshake. A remote attacker could
use this issue to bypass client authentication.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
  erlang                          1:24.3.4.1+dfsg-1ubuntu0.1
  erlang-ssl                      1:24.3.4.1+dfsg-1ubuntu0.1

Ubuntu 22.04 LTS:
  erlang                          1:24.2.1+dfsg-1ubuntu0.1
  erlang-ssl                      1:24.2.1+dfsg-1ubuntu0.1

Ubuntu 20.04 LTS:
  erlang                          1:22.2.7+dfsg-1ubuntu0.2
  erlang-ssl                      1:22.2.7+dfsg-1ubuntu0.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6059-1
  CVE-2022-37026

Package Information:
  https://launchpad.net/ubuntu/+source/erlang/1:24.3.4.1+dfsg-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/erlang/1:24.2.1+dfsg-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/erlang/1:22.2.7+dfsg-1ubuntu0.2


--- FIDOGATE 5.12-ge4e8b94
 * Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441



   GoldED+ VK   │                                                 │   09:55:30    
                                                                                
В этой области больше нет сообщений.

Остаться здесь
Перейти к списку сообщений
Перейти к списку эх