[Buildroot] [PATCH] package/erlang: security bump to v26.2.5.15
Julien Olivain
ju.o at free.fr
Mon Oct 6 19:25:12 UTC 2025
On 06/10/2025 16:15, Titouan Christophe via buildroot wrote:
> See the release notes on
> https://github.com/erlang/otp/releases?q=OTP-26.&expanded=true
>
> Also, remove patch that is now applied upstream
>
> This fixes the following vulnerabilities:
> - CVE-2024-53846:
> OTP is a set of Erlang libraries, which consists of the Erlang
> runtime
> system, a number of ready-to-use components mainly written in
> Erlang,
> and a set of design principles for Erlang programs. A regression
> was
> introduced into the ssl application of OTP starting at
> OTP-25.3.2.8,
> OTP-26.2, and OTP-27.0, resulting in a server or client verifying
> the
> peer when incorrect extended key usage is presented (i.e., a server
> will verify a client if they have server auth ext key usage and
> vice
> versa).
> https://www.cve.org/CVERecord?id=CVE-2024-53846
>
> - CVE-2025-4748:
> Improper Limitation of a Pathname to a Restricted Directory ('Path
> Traversal') vulnerability in Erlang OTP (stdlib modules) allows
> Absolute Path Traversal, File Manipulation. This vulnerability is
> associated with program files lib/stdlib/src/zip.erl and program
> routines zip:unzip/1, zip:unzip/2, zip:extract/1,
> zip:extract/2 unless
> the memory option is passed. This issue affects OTP from OTP 17.0
> until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to
> stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
> https://www.cve.org/CVERecord?id=CVE-2025-4748
>
> - CVE-2025-26618:
> Erlang is a programming language and runtime system for building
> massively scalable soft real-time systems with requirements on high
> availability. OTP is a set of Erlang libraries, which consists of
> the
> Erlang runtime system, a number of ready-to-use components mainly
> written in Erlang. Packet size is not verified properly for SFTP
> packets. As a result when multiple SSH packets (conforming to max
> SSH
> packet size) are received by ssh, they might be combined into an
> SFTP
> packet which will exceed the max allowed packet size and
> potentially
> cause large amount of memory to be allocated. Note that situation
> described above can only happen for successfully authenticated
> users
> after completing the SSH handshake. This issue has been patched in
> OTP
> versions 27.2.4, 26.2.5.9, and 25.3.2.18. There are no known
> workarounds for this vulnerability.
> https://www.cve.org/CVERecord?id=CVE-2025-26618
>
> - CVE-2025-30211:
> Erlang/OTP is a set of libraries for the Erlang programming
> language.
> Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a
> maliciously
> formed KEX init message can result with high memory usage.
> Implementation does not verify RFC specified limits on algorithm
> names
> (64 characters) provided in KEX init message. Big KEX init packet
> may
> lead to inefficient processing of the error data. As a result,
> large
> amount of memory will be allocated for processing malicious data.
> Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the
> issue.
> Some workarounds are available. One may set option `parallel_login`
> to
> `false` and/or reduce the `max_sessions` option.
> https://www.cve.org/CVERecord?id=CVE-2025-30211
>
> - CVE-2025-32433:
> Erlang/OTP is a set of libraries for the Erlang programming
> language.
> Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a
> SSH
> server may allow an attacker to perform unauthenticated remote code
> execution (RCE). By exploiting a flaw in SSH protocol message
> handling, a malicious actor could gain unauthorized access to
> affected
> systems and execute arbitrary commands without valid credentials.
> This
> issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and
> OTP-25.3.2.20. A temporary workaround involves disabling the SSH
> server or to prevent access via firewall rules.
> https://www.cve.org/CVERecord?id=CVE-2025-32433
>
> - CVE-2025-46712:
> Erlang/OTP is a set of libraries for the Erlang programming
> language.
> In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for
> OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to
> enforce strict KEX handshake hardening measures by allowing
> optional
> messages to be exchanged. This allows a Man-in-the-Middle attacker
> to
> inject these messages in a connection during the handshake. This
> issue
> has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12
> (for OTP-26), and OTP-25.3.2.21 (for OTP-25).
> https://www.cve.org/CVERecord?id=CVE-2025-46712
>
> - CVE-2025-48038:
> Allocation of Resources Without Limits or Throttling vulnerability
> in
> Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation,
> Resource Leak Exposure. This vulnerability is associated with
> program
> files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP
> 17.0
> until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh
> from
> 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
> https://www.cve.org/CVERecord?id=CVE-2025-48038
>
> - CVE-2025-48039:
> Allocation of Resources Without Limits or Throttling vulnerability
> in
> Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation,
> Resource Leak Exposure. This vulnerability is associated with
> program
> files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP
> 17.0
> until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh
> from
> 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
> https://www.cve.org/CVERecord?id=CVE-2025-48039
>
> - CVE-2025-48040:
> Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh
> (ssh_sftp modules) allows Excessive Allocation, Flooding. This
> vulnerability is associated with program files
> lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0
> until
> OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from
> 3.0.1
> until 5.3.3, 5.2.11.3 and 5.1.4.12.
> https://www.cve.org/CVERecord?id=CVE-2025-48040
>
> - CVE-2025-48041:
> Allocation of Resources Without Limits or Throttling vulnerability
> in
> Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation,
> Flooding. This vulnerability is associated with program files
> lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0
> until
> OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from
> 3.0.1
> until 5.3.3, 5.2.11.3 and 5.1.4.12.
> https://www.cve.org/CVERecord?id=CVE-2025-48041
>
> NB: Since Erlang is quite a "large" package, containing the language
> itself,
> some libraries, and some "applications", it's difficult to tell which
> CVEs
> are exactly affecting Buildroot, but it's a good idea to update anyway
>
> Signed-off-by: Titouan Christophe <titouan.christophe at mind.be>
Applied to master, thanks.
More information about the buildroot
mailing list