tags 1104963 + pending
thanks

Hi Salvatore,

On Fri, May 9, 2025 at 7:27 AM Salvatore Bonaccorso <car...@debian.org> wrote:
>
> The following vulnerability was published for elarng.
>
> CVE-2025-46712[0]:
> | Erlang/OTP is a set of libraries for the Erlang programming
> | language. In versions prior to OTP-27.3.4 (for OTP-27),
> | OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25),
> | Erlang/OTP SSH fails to enforce strict KEX handshake hardening
> | measures by allowing optional messages to be exchanged. This allows
> | a Man-in-the-Middle attacker to inject these messages in a
> | connection during the handshake. This issue has been patched in
> | versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and
> | OTP-25.3.2.21 (for OTP-25).
>
> This does not warrrant a DSA, fwiw, might be fixed in one of the next
> point releases ideally, but as well ideally already in trixie before
> the release.

Okay. I've prepared 27.3.4 with the fix for sid/trixie and added the
relevant patch to erlang in bookworm. The latter needs some
additional testing.

I'll upload both packages shortly.

>
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

Will do. Thank you for the report!

Cheers!
-- 
Sergei Golovan

Reply via email to