Update

USN-7961-1: Erlang vulnerability

USN-7961-1: Erlang vulnerability

Publication date: 14 January 2026
Overview: Erlang could allow unintended access to network services.

Packages
erlang - Concurrent, real-time, distributed functional language

Details
It was discovered that Erlang incorrectly validated peer certificates
when incorrect extended key usage was presented. A remote attacker could
possibly use this issue to bypass SSL key usage restrictions.

Update instructions
The problem can be corrected by updating your system to the following package versions:

24.04 LTS noble

  • erlang – 1:25.3.2.8+dfsg-1ubuntu4.6
  • erlang-ssl – 1:25.3.2.8+dfsg-1ubuntu4.6
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad