Bugzilla – Bug 924915
VUL-1: CVE-2015-2774: erlang: Erlang/OTP is vulnerable to Poodle in its TLS-1.0 implementation
Last modified: 2016-04-27 20:19:59 UTC
http://www.erlang.org/news/85 ... ssl: Remove default support for SSL-3.0 and added padding check for TLS-1.0 due to the Poodle vulnerability. ... References: https://bugzilla.redhat.com/show_bug.cgi?id=1206712
how is erlang talking to outside hosts iun our setups?
(In reply to Marcus Meissner from comment #1) > how is erlang talking to outside hosts iun our setups? It should not be talking to any outside host afaik.
I put it on the planned update list for the SLE branches. openSUSE could get fixes already.
bugbot adjusting priority
we don't have SSL enabled in our rabbitmq, does this really matter?
are you planning to SSL enable rabbitmq? or upgrade to newer Erlang in newer Cloud versions?
Yes, we've updated to a fixed version in Cloud 6 since we need a newer erlang there for systemd support.
if it will be fixed in cloud 6 I am happy.
Reassigning to security-team list, as the issue is resolved (Fixed package for Cloud 6, older Cloud versions don't have the vulnerability).
Dear openSUSE maintainer of devel:languages:erlang:Factory/erlang Please submit a maintenance update to openSUSE:13.2:Update/erlang
openSUSE 13.2 submission processed
release for 13.2
openSUSE-SU-2016:0523-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 924915 CVE References: CVE-2015-2774 Sources used: openSUSE 13.2 (src): erlang-17.1-3.3.1