Your message dated Thu, 17 Apr 2025 20:42:43 +0000
with message-id <e1u5w4j-006ycf...@respighi.debian.org>
and subject line unblock erlang
has caused the Debian Bug report #1103458,
regarding unblock: erlang/1:27.3.3+dfsg-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1103458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103458
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
X-Debbugs-Cc: erl...@packages.debian.org, t...@security.debian.org, Sergei 
Golovan <sgolo...@debian.org>, car...@debian.org
Control: affects -1 + src:erlang
User: release.debian....@packages.debian.org
Usertags: unblock

Hi release team,

[Note not the maintainer here, but reaching out to you as
security team member]

erlang/1:27.3.3+dfsg-1 fixes a critical CVE, CVE-2025-32433, #1103442,
in the Erlang/OTP SSH server allowing unauthenticated remote code
execution. 

The upload to unstable contained more than that and the fix is
included in the new upstream version. The set of changes though is
still limited, and I'm adding the maintainer here as well fo
X-Debbugs-CC to confirm.

https://github.com/erlang/otp/releases/tag/OTP-27.3.3

If you agree to please lower the required time for transition to
testing to allow to fix CVE-2025-32433.

Regards,
Salvatore

Attachment: erlang_27.3.3+dfsg-1.debdiff.xz
Description: application/xz


--- End Message ---
--- Begin Message ---
Unblocked.

--- End Message ---

Reply via email to