• Bug#1103442: erlang: CVE-2025-32433

    From Salvatore Bonaccorso@21:1/5 to All on Thu Apr 17 20:50:01 2025
    Source: erlang
    Version: 1:25.2.3+dfsg-1
    Severity: grave
    Tags: security upstream fixed-upstream
    Justification: user security hole
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
    Control: found -1 1:27.3.2+dfsg-1
    Control: fixed -1 1:27.3.3+dfsg-1

    Hi,

    The following vulnerability was published for erlang.

    CVE-2025-32433[0]:
    | Erlang/OTP is a set of libraries for the Erlang programming
    | language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and
    | OTP-25.3.2.20, a SSH server may allow an attacker to perform
    | unauthenticated remote code execution (RCE). By exploiting a flaw in
    | SSH protocol message handling, a malicious actor could gain
    | unauthorized access to affected systems and execute arbitrary
    | commands without valid credentials. This issue is patched in
    | versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary
    | workaround involves disabling the SSH server or to prevent access
    | via firewall rules.


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-32433
    https://www.cve.org/CVERecord?id=CVE-2025-32433
    [1] https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)