openSUSE Security Update : erlang (openSUSE-2017-1358) (ROBOT)

critical Nessus Plugin ID 105241

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for erlang fixes security issues and bugs.

The following vulnerabilities were addressed :

- CVE-2017-1000385: Harden against the Bleichenbacher attacher against RSA

- CVE-2016-10253: Heap overflow through regular expressions (bsc#1030062)

In addition Erlang was updated to version 18.3.4.6, containing a number of upstream bug fixes and improvements.

Solution

Update the affected erlang packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1030062

Plugin Details

Severity: Critical

ID: 105241

File Name: openSUSE-2017-1358.nasl

Version: 3.6

Type: local

Agent: unix

Published: 12/14/2017

Updated: 11/11/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-10253

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:erlang, p-cpe:/a:novell:opensuse:erlang-observer, p-cpe:/a:novell:opensuse:erlang-dialyzer-src, p-cpe:/a:novell:opensuse:erlang-src, p-cpe:/a:novell:opensuse:erlang-dialyzer-debuginfo, p-cpe:/a:novell:opensuse:erlang-epmd, p-cpe:/a:novell:opensuse:erlang-wx, p-cpe:/a:novell:opensuse:erlang-observer-src, p-cpe:/a:novell:opensuse:erlang-debuginfo, p-cpe:/a:novell:opensuse:erlang-debugger-src, p-cpe:/a:novell:opensuse:erlang-jinterface, p-cpe:/a:novell:opensuse:erlang-wx-debuginfo, p-cpe:/a:novell:opensuse:erlang-et, p-cpe:/a:novell:opensuse:erlang-gs, p-cpe:/a:novell:opensuse:erlang-debugger, p-cpe:/a:novell:opensuse:erlang-jinterface-src, p-cpe:/a:novell:opensuse:erlang-reltool, p-cpe:/a:novell:opensuse:erlang-dialyzer, p-cpe:/a:novell:opensuse:erlang-diameter-src, p-cpe:/a:novell:opensuse:erlang-epmd-debuginfo, p-cpe:/a:novell:opensuse:erlang-debugsource, p-cpe:/a:novell:opensuse:erlang-wx-src, p-cpe:/a:novell:opensuse:erlang-diameter, cpe:/o:novell:opensuse:42.2, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:erlang-et-src, p-cpe:/a:novell:opensuse:erlang-gs-src, p-cpe:/a:novell:opensuse:erlang-reltool-src

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2017

Reference Information

CVE: CVE-2016-10253, CVE-2017-1000385