lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 8 Dec 2017 07:51:42 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4057-1] erlang security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4057-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 08, 2017                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : erlang
CVE ID         : CVE-2017-1000385

It was discovered that the TLS server in Erlang is vulnerable to an
adaptive chosen ciphertext attack against RSA keys.

For the oldstable distribution (jessie), this problem has been fixed
in version 1:17.3-dfsg-4+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1:19.2.1+dfsg-2+deb9u1.

We recommend that you upgrade your erlang packages.

For the detailed security status of erlang please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/erlang

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=RfhS
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ