Bugzilla – Bug 1177354
VUL-0: CVE-2020-25623: erlang: Erlang/OTP: allows attackers to read arbitrary files via a crafted HTTP request
Last modified: 2024-05-22 02:50:18 UTC
rh#1885311 Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used. Reference: https://github.com/erlang/otp/releases/tag/OTP-23.1 References: https://bugzilla.redhat.com/show_bug.cgi?id=1885311 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25623 http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-25623.html https://github.com/erlang/otp/releases/tag/OTP-23.1 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25623 https://www.erlang.org/downloads https://www.erlang.org/news
only relevant for Tumbleweed/Factory
Update for Factory has been prepared in sr#839763 For openSUSE Leap, please contact Gabriele Santomaggio, since erlang for Leap comes from SLE.
(In reply to Matwey Kornilov from comment #2) > Update for Factory has been prepared in sr#839763 > > For openSUSE Leap, please contact Gabriele Santomaggio, since erlang for > Leap comes from SLE. Erlang 23.1.1 is in Factory, so I close this now.