Name | CVE-2015-2774 |
Description | Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 781839 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
erlang (PTS) | jessie, jessie (lts) | 1:17.3-dfsg-4+deb8u2 | fixed |
| stretch (security) | 1:19.2.1+dfsg-2+deb9u1 | fixed |
| stretch (lts), stretch | 1:19.2.1+dfsg-2+really23.3.4.18-0+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 1:22.2.7+dfsg-1+deb10u1 | fixed |
| bullseye | 1:23.2.6+dfsg-1+deb11u1 | fixed |
| bookworm | 1:25.2.3+dfsg-1 | fixed |
| sid, trixie | 1:25.3.2.12+dfsg-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
erlang | source | (unstable) | 1:17.3-dfsg-4 | low | | 781839 |
Notes
[squeeze] - erlang <no-dsa> (Minor issue)
[wheezy] - erlang <no-dsa> (Minor issue)
http://www.erlang.org/news/85
CVE about "ssl: ... added padding check for TLS-1.0 due to the Poodle vulnerability."
https://github.com/erlang/otp/commit/e53c55dd0ab69982bc511396ccf8655d27c6d38c