[From nobody Tue Mar 17 09:07:03 2026
Received: (at submit) by bugs.debian.org; 15 Mar 2026 20:05:35 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-9.9 required=4.0 tests=BAYES_00, FOURLA,
 FROMDEVELOPER, 
 NO_RELAYS,XMAILER_REPORTBUG autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 47; hammy, 150; neutral, 201; spammy,
 0. spammytokens: hammytokens:0.000-+--H*F:U*carnil,
 0.000-+--XDebbugsCc, 0.000-+--X-Debbugs-Cc, 0.000-+--HTo:N*Debian,
 0.000-+--H*Ad:N*Bug
Return-path: &lt;carnil@debian.org&gt;
Received: via submission by buxtehude.debian.org with esmtp (Exim 4.96)
 (envelope-from &lt;carnil@debian.org&gt;) id 1w1riQ-008fp0-0q
 for submit@bugs.debian.org; Sun, 15 Mar 2026 20:05:35 +0000
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Salvatore Bonaccorso &lt;carnil@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: erlang: CVE-2026-23941 CVE-2026-23942 CVE-2026-23943
Message-ID: &lt;177360513326.3699242.16558055137446328702.reportbug@eldamar.lan&gt;
X-Mailer: reportbug 13.2.0
Date: Sun, 15 Mar 2026 21:05:33 +0100
Delivered-To: submit@bugs.debian.org

Source: erlang
Version: 1:27.3.4.8+dfsg-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team &lt;team@security.debian.org&gt;

Hi,

The following vulnerabilities were published for erlang.

CVE-2026-23941[0]:
| Inconsistent Interpretation of HTTP Requests ('HTTP Request
| Smuggling') vulnerability in Erlang OTP (inets httpd module) allows
| HTTP Request Smuggling.  This vulnerability is associated with
| program files lib/inets/src/http_server/httpd_request.erl and
| program routines httpd_request:parse_headers/7.  The server does not
| reject or normalize duplicate Content-Length headers. The earliest
| Content-Length in the request is used for body parsing while common
| reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-
| Length value. This violates RFC 9112 Section 6.3 and allows front-
| end/back-end desynchronization, leaving attacker-controlled bytes
| queued as the start of the next request.  This issue affects OTP
| from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18,
| corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.


CVE-2026-23942[1]:
| Improper Limitation of a Pathname to a Restricted Directory ('Path
| Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows
| Path Traversal.  This vulnerability is associated with program files
| lib/ssh/src/ssh_sftpd.erl and program routines
| ssh_sftpd:is_within_root/2.  The SFTP server uses string prefix
| matching via lists:prefix/2 rather than proper path component
| validation when checking if a path is within the configured root
| directory. This allows authenticated users to access sibling
| directories that share a common name prefix with the configured root
| directory. For example, if root is set to /home/user1, paths like
| /home/user10 or /home/user1_backup would incorrectly be considered
| within the root.  This issue affects OTP from OTP 17.0 until OTP
| 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from
| 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.


CVE-2026-23943[2]:
| Improper Handling of Highly Compressed Data (Compression Bomb)
| vulnerability in Erlang OTP ssh (ssh_transport modules) allows
| Denial of Service via Resource Depletion.  The SSH transport layer
| advertises legacy zlib compression by default and inflates attacker-
| controlled payloads pre-authentication without any size limit,
| enabling reliable memory exhaustion DoS.  Two compression algorithms
| are affected:  * zlib: Activates immediately after key exchange,
| enabling unauthenticated attacks * zlib@openssh.com: Activates post-
| authentication, enabling authenticated attacks  Each SSH packet can
| decompress ~255 MB from 256 KB of wire data (1029:1 amplification
| ratio). Multiple packets can rapidly exhaust available memory,
| causing OOM kills in memory-constrained environments.  This
| vulnerability is associated with program files
| lib/ssh/src/ssh_transport.erl and program routines
| ssh_transport:decompress/2, ssh_transport:handle_packet_part/4.
| This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and
| 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and
| 5.1.4.14.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities &amp; Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-23941
    https://www.cve.org/CVERecord?id=CVE-2026-23941
[1] https://security-tracker.debian.org/tracker/CVE-2026-23942
    https://www.cve.org/CVERecord?id=CVE-2026-23942
[2] https://security-tracker.debian.org/tracker/CVE-2026-23943
    https://www.cve.org/CVERecord?id=CVE-2026-23943

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
]