SB20250422145 - SUSE update for erlang26



SB20250422145 - SUSE update for erlang26

Published: April 22, 2025 Updated: January 4, 2026

Security Bulletin ID SB20250422145
Severity
Critical
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 50% High 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Uncontrolled Memory Allocation (CVE-ID: CVE-2025-30211)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to implementation does not verify RFC specified limits on algorithm names provided in KEX init message. A remote attacker can cause a denial of service (DoS) condition on the target system.


2) Missing Authentication for Critical Function (CVE-ID: CVE-2025-32433)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to missing authentication in Erlang/OTP SSH server. A remote non-authenticated attacker can send specially crafted messages to the server and execute arbitrary code on the system.


Remediation

Install update from vendor's website.