Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23941 (GCVE-0-2026-23941)
Vulnerability from cvelistv5 – Published: 2026-03-13 09:11 – Updated: 2026-04-07 14:38
VLAI?
EPSS
Title
Request smuggling via first-wins Content-Length parsing in inets httpd
Summary
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.
This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.
The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.
This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.
Severity ?
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Assigner
References
| URL | Tags | |
|---|---|---|
|
|
||
Impacted products
Credits
Luigino Camastra / Aisle Research
Konrad Pietrzak
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-23941",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-13T16:00:50.466386Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-13T16:00:56.733Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"modules": [
"httpd_request"
],
"packageName": "inets",
"packageURL": "pkg:otp/inets?repository_url=https:%2F%2Fgithub.com%2Ferlang%2Fotp\u0026vcs_url=git%20https:%2F%2Fgithub.com%2Ferlang%2Fotp.git",
"product": "OTP",
"programFiles": [
"src/http_server/httpd_request.erl"
],
"programRoutines": [
{
"name": "httpd_request:parse_headers/7"
}
],
"repo": "https://github.com/erlang/otp",
"vendor": "Erlang",
"versions": [
{
"changes": [
{
"at": "9.6.1",
"status": "unaffected"
},
{
"at": "9.3.2.3",
"status": "unaffected"
},
{
"at": "9.1.0.5",
"status": "unaffected"
}
],
"lessThan": "*",
"status": "affected",
"version": "5.10",
"versionType": "otp"
}
]
},
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"modules": [
"httpd_request"
],
"packageName": "erlang/otp",
"packageURL": "pkg:github/erlang/otp",
"product": "OTP",
"programFiles": [
"lib/inets/src/http_server/httpd_request.erl"
],
"programRoutines": [
{
"name": "httpd_request:parse_headers/7"
}
],
"repo": "https://github.com/erlang/otp",
"vendor": "Erlang",
"versions": [
{
"changes": [
{
"at": "28.4.1",
"status": "unaffected"
},
{
"at": "27.3.4.9",
"status": "unaffected"
},
{
"at": "26.2.5.18",
"status": "unaffected"
}
],
"lessThan": "*",
"status": "affected",
"version": "17.0",
"versionType": "otp"
},
{
"changes": [
{
"at": "a4b46336fd25aa100ac602eb9a627aaead7eda18",
"status": "unaffected"
},
{
"at": "a761d391d8d08316cbd7d4a86733ba932b73c45b",
"status": "unaffected"
},
{
"at": "e775a332f623851385ab6ddb866d9b150612ddf6",
"status": "unaffected"
}
],
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "git"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The inets httpd server must be deployed behind a reverse proxy that honors a different Content-Length header than httpd (e.g., last vs. first). HTTP keep-alive must be enabled (the default)."
}
],
"value": "The inets httpd server must be deployed behind a reverse proxy that honors a different Content-Length header than httpd (e.g., last vs. first). HTTP keep-alive must be enabled (the default)."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "26.2.5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.3.4.9",
"versionStartIncluding": "27.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:erlang:erlang\\/otp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "28.4.1",
"versionStartIncluding": "28.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Luigino Camastra / Aisle Research"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Konrad Pietrzak"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\u003cp\u003eThis vulnerability is associated with program files \u003ctt\u003elib/inets/src/http_server/httpd_request.erl\u003c/tt\u003e and program routines \u003ctt\u003ehttpd_request:parse_headers/7\u003c/tt\u003e.\u003c/p\u003e\u003cp\u003eThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\u003c/p\u003e\u003cp\u003eThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.\u003c/p\u003e"
}
],
"value": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\n\nThis vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.\n\nThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5."
}
],
"impacts": [
{
"capecId": "CAPEC-33",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-33 HTTP Request Smuggling"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 7,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-07T14:38:08.041Z",
"orgId": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"shortName": "EEF"
},
"references": [
{
"tags": [
"vendor-advisory",
"related"
],
"url": "https://github.com/erlang/otp/security/advisories/GHSA-w4jc-9wpv-pqh7"
},
{
"tags": [
"related"
],
"url": "https://cna.erlef.org/cves/CVE-2026-23941.html"
},
{
"tags": [
"related"
],
"url": "https://osv.dev/vulnerability/EEF-CVE-2026-23941"
},
{
"tags": [
"x_version-scheme"
],
"url": "https://www.erlang.org/doc/system/versions.html#order-of-versions"
},
{
"tags": [
"patch"
],
"url": "https://github.com/erlang/otp/commit/a4b46336fd25aa100ac602eb9a627aaead7eda18"
},
{
"tags": [
"patch"
],
"url": "https://github.com/erlang/otp/commit/a761d391d8d08316cbd7d4a86733ba932b73c45b"
},
{
"tags": [
"patch"
],
"url": "https://github.com/erlang/otp/commit/e775a332f623851385ab6ddb866d9b150612ddf6"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Request smuggling via first-wins Content-Length parsing in inets httpd",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cul\u003e\u003cli\u003eConfigure frontend proxy to reject requests with duplicate Content-Length headers.\u003c/li\u003e\u003cli\u003eDisable HTTP keep-alive on httpd by adding \u003ctt\u003e{keep_alive, false}\u003c/tt\u003e to httpd configuration. Note: This impacts performance for clients making multiple requests.\u003c/li\u003e\u003cli\u003eDeploy a Web Application Firewall (WAF) configured to reject requests with multiple Content-Length headers.\u003c/li\u003e\u003c/ul\u003e"
}
],
"value": "* Configure frontend proxy to reject requests with duplicate Content-Length headers.\n* Disable HTTP keep-alive on httpd by adding `{keep_alive, false}` to httpd configuration. Note: This impacts performance for clients making multiple requests.\n* Deploy a Web Application Firewall (WAF) configured to reject requests with multiple Content-Length headers."
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"assignerShortName": "EEF",
"cveId": "CVE-2026-23941",
"datePublished": "2026-03-13T09:11:58.175Z",
"dateReserved": "2026-01-19T14:23:14.343Z",
"dateUpdated": "2026-04-07T14:38:08.041Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23941",
"date": "2026-05-03",
"epss": "0.00025",
"percentile": "0.07037"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23941\",\"sourceIdentifier\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\",\"published\":\"2026-03-13T19:54:15.237\",\"lastModified\":\"2026-04-06T17:17:08.310\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\\n\\nThis vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.\\n\\nThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\\n\\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad de Interpretaci\u00f3n inconsistente de solicitudes HTTP (\u0027Contrabando de solicitudes HTTP\u0027) en Erlang OTP (m\u00f3dulo inets httpd) permite el contrabando de solicitudes HTTP.\\n\\nEsta vulnerabilidad est\u00e1 asociada con los archivos de programa lib/inets/src/http_server/httpd_request.erl y las rutinas de programa httpd_request:parse_headers/7.\\n\\nEl servidor no rechaza ni normaliza los encabezados Content-Length duplicados. El Content-Length m\u00e1s temprano en la solicitud se utiliza para el an\u00e1lisis del cuerpo, mientras que los proxies inversos comunes (nginx, Apache httpd, Envoy) respetan el \u00faltimo valor de Content-Length. Esto viola la Secci\u00f3n 6.3 de RFC 9112 y permite la desincronizaci\u00f3n front-end/back-end, dejando bytes controlados por el atacante en cola como el inicio de la siguiente solicitud.\\n\\nEste problema afecta a OTP desde OTP 17.0 hasta OTP 28.4.1, OTP 27.3.4.9 y OTP 26.2.5.18, lo que corresponde a inets desde 5.10 hasta 9.6.1, 9.3.2.3 y 9.1.0.5.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"HIGH\",\"subAvailabilityImpact\":\"LOW\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-444\"}]}],\"references\":[{\"url\":\"https://cna.erlef.org/cves/CVE-2026-23941.html\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"},{\"url\":\"https://github.com/erlang/otp/commit/a4b46336fd25aa100ac602eb9a627aaead7eda18\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"},{\"url\":\"https://github.com/erlang/otp/commit/a761d391d8d08316cbd7d4a86733ba932b73c45b\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"},{\"url\":\"https://github.com/erlang/otp/commit/e775a332f623851385ab6ddb866d9b150612ddf6\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"},{\"url\":\"https://github.com/erlang/otp/security/advisories/GHSA-w4jc-9wpv-pqh7\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"},{\"url\":\"https://osv.dev/vulnerability/EEF-CVE-2026-23941\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"},{\"url\":\"https://www.erlang.org/doc/system/versions.html#order-of-versions\",\"source\":\"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-23941\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-13T16:00:50.466386Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-13T16:00:52.958Z\"}}], \"cna\": {\"title\": \"Request smuggling via first-wins Content-Length parsing in inets httpd\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Luigino Camastra / Aisle Research\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Konrad Pietrzak\"}], \"impacts\": [{\"capecId\": \"CAPEC-33\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-33 HTTP Request Smuggling\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"LOW\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:erlang:erlang\\\\/otp:*:*:*:*:*:*:*:*\"], \"repo\": \"https://github.com/erlang/otp\", \"vendor\": \"Erlang\", \"modules\": [\"httpd_request\"], \"product\": \"OTP\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"9.6.1\", \"status\": \"unaffected\"}, {\"at\": \"9.3.2.3\", \"status\": \"unaffected\"}, {\"at\": \"9.1.0.5\", \"status\": \"unaffected\"}], \"version\": \"5.10\", \"lessThan\": \"*\", \"versionType\": \"otp\"}], \"packageURL\": \"pkg:otp/inets?repository_url=https:%2F%2Fgithub.com%2Ferlang%2Fotp\u0026vcs_url=git%20https:%2F%2Fgithub.com%2Ferlang%2Fotp.git\", \"packageName\": \"inets\", \"programFiles\": [\"src/http_server/httpd_request.erl\"], \"defaultStatus\": \"unknown\", \"programRoutines\": [{\"name\": \"httpd_request:parse_headers/7\"}]}, {\"cpes\": [\"cpe:2.3:a:erlang:erlang\\\\/otp:*:*:*:*:*:*:*:*\"], \"repo\": \"https://github.com/erlang/otp\", \"vendor\": \"Erlang\", \"modules\": [\"httpd_request\"], \"product\": \"OTP\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"28.4.1\", \"status\": \"unaffected\"}, {\"at\": \"27.3.4.9\", \"status\": \"unaffected\"}, {\"at\": \"26.2.5.18\", \"status\": \"unaffected\"}], \"version\": \"17.0\", \"lessThan\": \"*\", \"versionType\": \"otp\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"a4b46336fd25aa100ac602eb9a627aaead7eda18\", \"status\": \"unaffected\"}, {\"at\": \"a761d391d8d08316cbd7d4a86733ba932b73c45b\", \"status\": \"unaffected\"}, {\"at\": \"e775a332f623851385ab6ddb866d9b150612ddf6\", \"status\": \"unaffected\"}], \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"git\"}], \"packageURL\": \"pkg:github/erlang/otp\", \"packageName\": \"erlang/otp\", \"programFiles\": [\"lib/inets/src/http_server/httpd_request.erl\"], \"collectionURL\": \"https://github.com\", \"defaultStatus\": \"unknown\", \"programRoutines\": [{\"name\": \"httpd_request:parse_headers/7\"}]}], \"references\": [{\"url\": \"https://github.com/erlang/otp/security/advisories/GHSA-w4jc-9wpv-pqh7\", \"tags\": [\"vendor-advisory\", \"related\"]}, {\"url\": \"https://cna.erlef.org/cves/CVE-2026-23941.html\", \"tags\": [\"related\"]}, {\"url\": \"https://osv.dev/vulnerability/EEF-CVE-2026-23941\", \"tags\": [\"related\"]}, {\"url\": \"https://www.erlang.org/doc/system/versions.html#order-of-versions\", \"tags\": [\"x_version-scheme\"]}, {\"url\": \"https://github.com/erlang/otp/commit/a4b46336fd25aa100ac602eb9a627aaead7eda18\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/erlang/otp/commit/a761d391d8d08316cbd7d4a86733ba932b73c45b\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/erlang/otp/commit/e775a332f623851385ab6ddb866d9b150612ddf6\", \"tags\": [\"patch\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"* Configure frontend proxy to reject requests with duplicate Content-Length headers.\\n* Disable HTTP keep-alive on httpd by adding `{keep_alive, false}` to httpd configuration. Note: This impacts performance for clients making multiple requests.\\n* Deploy a Web Application Firewall (WAF) configured to reject requests with multiple Content-Length headers.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cul\u003e\u003cli\u003eConfigure frontend proxy to reject requests with duplicate Content-Length headers.\u003c/li\u003e\u003cli\u003eDisable HTTP keep-alive on httpd by adding \u003ctt\u003e{keep_alive, false}\u003c/tt\u003e to httpd configuration. Note: This impacts performance for clients making multiple requests.\u003c/li\u003e\u003cli\u003eDeploy a Web Application Firewall (WAF) configured to reject requests with multiple Content-Length headers.\u003c/li\u003e\u003c/ul\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\\n\\nThis vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.\\n\\nThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\\n\\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\u003cp\u003eThis vulnerability is associated with program files \u003ctt\u003elib/inets/src/http_server/httpd_request.erl\u003c/tt\u003e and program routines \u003ctt\u003ehttpd_request:parse_headers/7\u003c/tt\u003e.\u003c/p\u003e\u003cp\u003eThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\u003c/p\u003e\u003cp\u003eThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-444\", \"description\": \"CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"The inets httpd server must be deployed behind a reverse proxy that honors a different Content-Length header than httpd (e.g., last vs. first). HTTP keep-alive must be enabled (the default).\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The inets httpd server must be deployed behind a reverse proxy that honors a different Content-Length header than httpd (e.g., last vs. first). HTTP keep-alive must be enabled (the default).\", \"base64\": false}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:erlang:erlang\\\\/otp:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"26.2.5.18\"}, {\"criteria\": \"cpe:2.3:a:erlang:erlang\\\\/otp:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"27.3.4.9\", \"versionStartIncluding\": \"27.0\"}, {\"criteria\": \"cpe:2.3:a:erlang:erlang\\\\/otp:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"28.4.1\", \"versionStartIncluding\": \"28.0\"}], \"operator\": \"OR\"}], \"operator\": \"AND\"}], \"providerMetadata\": {\"orgId\": \"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\", \"shortName\": \"EEF\", \"dateUpdated\": \"2026-04-07T14:38:08.041Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-23941\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-07T14:38:08.041Z\", \"dateReserved\": \"2026-01-19T14:23:14.343Z\", \"assignerOrgId\": \"6b3ad84c-e1a6-4bf7-a703-f496b71e49db\", \"datePublished\": \"2026-03-13T09:11:58.175Z\", \"assignerShortName\": \"EEF\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2026-AVI-0436
Vulnerability from certfr_avis - Published: 2026-04-15 - Updated: 2026-04-16
De multiples vulnérabilités ont été découvertes dans Tenable Identity Exposure. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.17 |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.17",
"product": {
"name": "Identity Exposure",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23943",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23943"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2026-23942",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23942"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2026-23941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23941"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2026-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21715"
},
{
"name": "CVE-2026-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26130"
},
{
"name": "CVE-2026-21717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21717"
},
{
"name": "CVE-2026-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21716"
},
{
"name": "CVE-2026-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21262"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2026-3805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3805"
},
{
"name": "CVE-2026-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26115"
},
{
"name": "CVE-2026-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21714"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2026-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21713"
},
{
"name": "CVE-2026-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21218"
},
{
"name": "CVE-2026-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21710"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
}
],
"initial_release_date": "2026-04-15T00:00:00",
"last_revision_date": "2026-04-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0436",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-15T00:00:00.000000"
},
{
"description": "Ajout des identifiants CVE-2026-1965, CVE-2026-3783, CVE-2026-3784 et CVE-2026-3805.",
"revision_date": "2026-04-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Identity Exposure. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Identity Exposure",
"vendor_advisories": [
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2026-11",
"url": "https://www.tenable.com/security/tns-2026-11"
}
]
}
CERTFR-2026-AVI-0321
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | azl3 libexif 0.6.24-1 versions antérieures à 0.6.24-2 | ||
| Microsoft | N/A | cbl2 erlang 25.3.2.21-4 versions antérieures à 25.3.2.21-5 | ||
| Microsoft | N/A | cbl2 libarchive 3.6.1-8 versions antérieures à 3.6.1-9 | ||
| Microsoft | N/A | azl3 erlang 26.2.5.17-1 versions antérieures à 26.2.5.18-1 |
References
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 libexif 0.6.24-1 versions ant\u00e9rieures \u00e0 0.6.24-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 erlang 25.3.2.21-4 versions ant\u00e9rieures \u00e0 25.3.2.21-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libarchive 3.6.1-8 versions ant\u00e9rieures \u00e0 3.6.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 erlang 26.2.5.17-1 versions ant\u00e9rieures \u00e0 26.2.5.18-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23943",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23943"
},
{
"name": "CVE-2026-23942",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23942"
},
{
"name": "CVE-2026-23941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23941"
},
{
"name": "CVE-2026-32775",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32775"
},
{
"name": "CVE-2026-4111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4111"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0321",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23941",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23941"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4111",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4111"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32775",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32775"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23943",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23943"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23942",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23942"
}
]
}
SUSE-SU-2026:21374-1
Vulnerability from csaf_suse - Published: 2026-04-22 11:46 - Updated: 2026-04-22 11:46Summary
Security update for erlang
Severity
Important
Notes
Title of the patch: Security update for erlang
Description of the patch: This update for erlang fixes the following issues:
Security issues fixed:
- CVE-2026-21620: improper isolation and compartmentalization can lead to TFTP relative path traversal and remote
arbitrary reads/writes (bsc#1258663).
- CVE-2026-23941: improper handling of duplicate Content-Length headers in Erlang OTP can lead to HTTP request
smuggling (bsc#1259687).
- CVE-2026-23942: improper limitation of a pathname to a restricted directory in the SFTP server can lead to path
traversal (bsc#1259681).
- CVE-2026-23943: improper handling of highly compressed data in Erlang OTP ssh can lead to denial of service
(bsc#1259682).
- CVE-2026-28808: incorrect authorization can lead to unauthenticated access to protected CGI scripts (bsc#1261728).
- CVE-2026-28810: predictable DNS transaction IDs can lead to DNS cache poisoning (bsc#1261726).
- CVE-2026-32144: missing signature verification can lead to OCSP authorization bypass and information disclosure
(bsc#1261734).
Other updates and bugfixes:
- jinterface: allow to build determenistic OtpErlang.jar (bsc#1262288).
Patchnames: SUSE-SLES-16.0-619
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for erlang",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for erlang fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2026-21620: improper isolation and compartmentalization can lead to TFTP relative path traversal and remote\n arbitrary reads/writes (bsc#1258663).\n- CVE-2026-23941: improper handling of duplicate Content-Length headers in Erlang OTP can lead to HTTP request\n smuggling (bsc#1259687).\n- CVE-2026-23942: improper limitation of a pathname to a restricted directory in the SFTP server can lead to path\n traversal (bsc#1259681).\n- CVE-2026-23943: improper handling of highly compressed data in Erlang OTP ssh can lead to denial of service\n (bsc#1259682).\n- CVE-2026-28808: incorrect authorization can lead to unauthenticated access to protected CGI scripts (bsc#1261728).\n- CVE-2026-28810: predictable DNS transaction IDs can lead to DNS cache poisoning (bsc#1261726).\n- CVE-2026-32144: missing signature verification can lead to OCSP authorization bypass and information disclosure\n (bsc#1261734).\n\nOther updates and bugfixes:\n\n- jinterface: allow to build determenistic OtpErlang.jar (bsc#1262288).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-619",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21374-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21374-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621374-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21374-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/046067.html"
},
{
"category": "self",
"summary": "SUSE Bug 1258663",
"url": "https://bugzilla.suse.com/1258663"
},
{
"category": "self",
"summary": "SUSE Bug 1259681",
"url": "https://bugzilla.suse.com/1259681"
},
{
"category": "self",
"summary": "SUSE Bug 1259682",
"url": "https://bugzilla.suse.com/1259682"
},
{
"category": "self",
"summary": "SUSE Bug 1259687",
"url": "https://bugzilla.suse.com/1259687"
},
{
"category": "self",
"summary": "SUSE Bug 1261726",
"url": "https://bugzilla.suse.com/1261726"
},
{
"category": "self",
"summary": "SUSE Bug 1261728",
"url": "https://bugzilla.suse.com/1261728"
},
{
"category": "self",
"summary": "SUSE Bug 1261734",
"url": "https://bugzilla.suse.com/1261734"
},
{
"category": "self",
"summary": "SUSE Bug 1262288",
"url": "https://bugzilla.suse.com/1262288"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21620 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23941 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23942 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23943 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-28808 page",
"url": "https://www.suse.com/security/cve/CVE-2026-28808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-28810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-28810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32144/"
}
],
"title": "Security update for erlang",
"tracking": {
"current_release_date": "2026-04-22T11:46:09Z",
"generator": {
"date": "2026-04-22T11:46:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21374-1",
"initial_release_date": "2026-04-22T11:46:09Z",
"revision_history": [
{
"date": "2026-04-22T11:46:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-epmd-27.1.3-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-epmd-27.1.3-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-27.1.3-160000.4.1.s390x",
"product_id": "erlang-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.s390x",
"product_id": "erlang-epmd-27.1.3-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-epmd-27.1.3-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-21620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21620"
}
],
"notes": [
{
"category": "general",
"text": "Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl.\n\nThis issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21620",
"url": "https://www.suse.com/security/cve/CVE-2026-21620"
},
{
"category": "external",
"summary": "SUSE Bug 1258663 for CVE-2026-21620",
"url": "https://bugzilla.suse.com/1258663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "important"
}
],
"title": "CVE-2026-21620"
},
{
"cve": "CVE-2026-23941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23941"
}
],
"notes": [
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\n\nThis vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.\n\nThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23941",
"url": "https://www.suse.com/security/cve/CVE-2026-23941"
},
{
"category": "external",
"summary": "SUSE Bug 1259687 for CVE-2026-23941",
"url": "https://bugzilla.suse.com/1259687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "moderate"
}
],
"title": "CVE-2026-23941"
},
{
"cve": "CVE-2026-23942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23942"
}
],
"notes": [
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal.\n\nThis vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2.\n\nThe SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23942",
"url": "https://www.suse.com/security/cve/CVE-2026-23942"
},
{
"category": "external",
"summary": "SUSE Bug 1259681 for CVE-2026-23942",
"url": "https://bugzilla.suse.com/1259681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "moderate"
}
],
"title": "CVE-2026-23942"
},
{
"cve": "CVE-2026-23943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23943"
}
],
"notes": [
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion.\n\nThe SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS.\n\nTwo compression algorithms are affected:\n\n* zlib: Activates immediately after key exchange, enabling unauthenticated attacks\n* zlib@openssh.com: Activates post-authentication, enabling authenticated attacks\n\nEach SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments.\n\nThis vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23943",
"url": "https://www.suse.com/security/cve/CVE-2026-23943"
},
{
"category": "external",
"summary": "SUSE Bug 1259682 for CVE-2026-23943",
"url": "https://bugzilla.suse.com/1259682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "moderate"
}
],
"title": "CVE-2026-23943"
},
{
"cve": "CVE-2026-28808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-28808"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect Authorization vulnerability in Erlang OTP (inets modules) allows unauthenticated access to CGI scripts protected by directory rules when served via script_alias.\n\nWhen script_alias maps a URL prefix to a directory outside DocumentRoot, mod_auth evaluates directory-based access controls against the DocumentRoot-relative path while mod_cgi executes the script at the ScriptAlias-resolved path. This path mismatch allows unauthenticated access to CGI scripts that directory rules were meant to protect.\n\nThis vulnerability is associated with program files lib/inets/src/http_server/mod_alias.erl, lib/inets/src/http_server/mod_auth.erl, and lib/inets/src/http_server/mod_cgi.erl.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.2, 27.3.4.10 and 26.2.5.19 corresponding to inets from 5.10 until 9.6.2, 9.3.2.4 and 9.1.0.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-28808",
"url": "https://www.suse.com/security/cve/CVE-2026-28808"
},
{
"category": "external",
"summary": "SUSE Bug 1261728 for CVE-2026-28808",
"url": "https://bugzilla.suse.com/1261728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "important"
}
],
"title": "CVE-2026-28808"
},
{
"cve": "CVE-2026-28810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-28810"
}
],
"notes": [
{
"category": "general",
"text": "Generation of Predictable Numbers or Identifiers vulnerability in Erlang/OTP kernel (inet_res, inet_db modules) allows DNS Cache Poisoning.\n\nThe built-in DNS resolver (inet_res) uses a sequential, process-global 16-bit transaction ID for UDP queries and does not implement source port randomization. Response validation relies almost entirely on this ID, making DNS cache poisoning practical for an attacker who can observe one query or predict the next ID. This conflicts with RFC 5452 recommendations for mitigating forged DNS answers.\n\ninet_res is intended for use in trusted network environments and with trusted recursive resolvers. Earlier documentation did not clearly state this deployment assumption, which could lead users to deploy the resolver in environments where spoofed DNS responses are possible.\n\nThis vulnerability is associated with program files lib/kernel/src/inet_db.erl and lib/kernel/src/inet_res.erl.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.2, 27.3.4.10 and 26.2.5.19 corresponding to kernel from 3.0 until 10.6.2, 10.2.7.4 and 9.2.4.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-28810",
"url": "https://www.suse.com/security/cve/CVE-2026-28810"
},
{
"category": "external",
"summary": "SUSE Bug 1261726 for CVE-2026-28810",
"url": "https://bugzilla.suse.com/1261726"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "moderate"
}
],
"title": "CVE-2026-28810"
},
{
"cve": "CVE-2026-32144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32144"
}
],
"notes": [
{
"category": "general",
"text": "Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification.\n\nThe OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate\u0027s issuer name matches the CA\u0027s subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid.\n\nThis affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context.\n\nThis vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3.\n\nThis issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32144",
"url": "https://www.suse.com/security/cve/CVE-2026-32144"
},
{
"category": "external",
"summary": "SUSE Bug 1261734 for CVE-2026-32144",
"url": "https://bugzilla.suse.com/1261734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-27.1.3-160000.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T11:46:09Z",
"details": "important"
}
],
"title": "CVE-2026-32144"
}
]
}
FKIE_CVE-2026-23941
Vulnerability from fkie_nvd - Published: 2026-03-13 19:54 - Updated: 2026-04-06 17:17
Severity ?
Summary
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.
This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.
The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.
This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.
References
| URL | Tags | ||
|---|---|---|---|
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://cna.erlef.org/cves/CVE-2026-23941.html | ||
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://github.com/erlang/otp/commit/a4b46336fd25aa100ac602eb9a627aaead7eda18 | ||
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://github.com/erlang/otp/commit/a761d391d8d08316cbd7d4a86733ba932b73c45b | ||
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://github.com/erlang/otp/commit/e775a332f623851385ab6ddb866d9b150612ddf6 | ||
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://github.com/erlang/otp/security/advisories/GHSA-w4jc-9wpv-pqh7 | ||
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://osv.dev/vulnerability/EEF-CVE-2026-23941 | ||
| 6b3ad84c-e1a6-4bf7-a703-f496b71e49db | https://www.erlang.org/doc/system/versions.html#order-of-versions |
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\n\nThis vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.\n\nThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5."
},
{
"lang": "es",
"value": "La vulnerabilidad de Interpretaci\u00f3n inconsistente de solicitudes HTTP (\u0027Contrabando de solicitudes HTTP\u0027) en Erlang OTP (m\u00f3dulo inets httpd) permite el contrabando de solicitudes HTTP.\n\nEsta vulnerabilidad est\u00e1 asociada con los archivos de programa lib/inets/src/http_server/httpd_request.erl y las rutinas de programa httpd_request:parse_headers/7.\n\nEl servidor no rechaza ni normaliza los encabezados Content-Length duplicados. El Content-Length m\u00e1s temprano en la solicitud se utiliza para el an\u00e1lisis del cuerpo, mientras que los proxies inversos comunes (nginx, Apache httpd, Envoy) respetan el \u00faltimo valor de Content-Length. Esto viola la Secci\u00f3n 6.3 de RFC 9112 y permite la desincronizaci\u00f3n front-end/back-end, dejando bytes controlados por el atacante en cola como el inicio de la siguiente solicitud.\n\nEste problema afecta a OTP desde OTP 17.0 hasta OTP 28.4.1, OTP 27.3.4.9 y OTP 26.2.5.18, lo que corresponde a inets desde 5.10 hasta 9.6.1, 9.3.2.3 y 9.1.0.5."
}
],
"id": "CVE-2026-23941",
"lastModified": "2026-04-06T17:17:08.310",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"type": "Secondary"
}
]
},
"published": "2026-03-13T19:54:15.237",
"references": [
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://cna.erlef.org/cves/CVE-2026-23941.html"
},
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://github.com/erlang/otp/commit/a4b46336fd25aa100ac602eb9a627aaead7eda18"
},
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://github.com/erlang/otp/commit/a761d391d8d08316cbd7d4a86733ba932b73c45b"
},
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://github.com/erlang/otp/commit/e775a332f623851385ab6ddb866d9b150612ddf6"
},
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://github.com/erlang/otp/security/advisories/GHSA-w4jc-9wpv-pqh7"
},
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://osv.dev/vulnerability/EEF-CVE-2026-23941"
},
{
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"url": "https://www.erlang.org/doc/system/versions.html#order-of-versions"
}
],
"sourceIdentifier": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-444"
}
],
"source": "6b3ad84c-e1a6-4bf7-a703-f496b71e49db",
"type": "Secondary"
}
]
}
MSRC_CVE-2026-23941
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-18 14:36Summary
Request smuggling via first-wins Content-Length parsing in inets httpd
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
CWE-444
- Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Vendor Fix
25.3.2.21-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
Vendor Fix
26.2.5.18-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
https://learn.microsoft.com/en-us/azure/azure-lin…
References
| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-23941 Request smuggling via first-wins Content-Length parsing in inets httpd - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-23941.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Request smuggling via first-wins Content-Length parsing in inets httpd",
"tracking": {
"current_release_date": "2026-03-18T14:36:18.000Z",
"generator": {
"date": "2026-03-19T07:03:33.266Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-23941",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-17T01:01:48.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-18T14:36:18.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 erlang 25.3.2.21-4",
"product": {
"name": "\u003ccbl2 erlang 25.3.2.21-4",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 erlang 25.3.2.21-4",
"product": {
"name": "cbl2 erlang 25.3.2.21-4",
"product_id": "20541"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 erlang 26.2.5.17-1",
"product": {
"name": "\u003cazl3 erlang 26.2.5.17-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 erlang 26.2.5.17-1",
"product": {
"name": "azl3 erlang 26.2.5.17-1",
"product_id": "20976"
}
}
],
"category": "product_name",
"name": "erlang"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 erlang 25.3.2.21-4 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 erlang 25.3.2.21-4 as a component of CBL Mariner 2.0",
"product_id": "20541-17086"
},
"product_reference": "20541",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 erlang 26.2.5.17-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 erlang 26.2.5.17-1 as a component of Azure Linux 3.0",
"product_id": "20976-17084"
},
"product_reference": "20976",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23941",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "general",
"text": "EEF",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20541-17086",
"20976-17084"
],
"known_affected": [
"17086-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-23941 Request smuggling via first-wins Content-Length parsing in inets httpd - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-23941.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-17T01:01:48.000Z",
"details": "25.3.2.21-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2026-03-17T01:01:48.000Z",
"details": "26.2.5.18-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "Request smuggling via first-wins Content-Length parsing in inets httpd"
}
]
}
OPENSUSE-SU-2026:20607-1
Vulnerability from csaf_opensuse - Published: 2026-04-22 10:52 - Updated: 2026-04-22 10:52Summary
Security update for erlang
Severity
Important
Notes
Title of the patch: Security update for erlang
Description of the patch: This update for erlang fixes the following issues:
Security issues fixed:
- CVE-2026-21620: improper isolation and compartmentalization can lead to TFTP relative path traversal and remote
arbitrary reads/writes (bsc#1258663).
- CVE-2026-23941: improper handling of duplicate Content-Length headers in Erlang OTP can lead to HTTP request
smuggling (bsc#1259687).
- CVE-2026-23942: improper limitation of a pathname to a restricted directory in the SFTP server can lead to path
traversal (bsc#1259681).
- CVE-2026-23943: improper handling of highly compressed data in Erlang OTP ssh can lead to denial of service
(bsc#1259682).
- CVE-2026-28808: incorrect authorization can lead to unauthenticated access to protected CGI scripts (bsc#1261728).
- CVE-2026-28810: predictable DNS transaction IDs can lead to DNS cache poisoning (bsc#1261726).
- CVE-2026-32144: missing signature verification can lead to OCSP authorization bypass and information disclosure
(bsc#1261734).
Other updates and bugfixes:
- jinterface: allow to build determenistic OtpErlang.jar (bsc#1262288).
Patchnames: openSUSE-Leap-16.0-619
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for erlang",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for erlang fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2026-21620: improper isolation and compartmentalization can lead to TFTP relative path traversal and remote\n arbitrary reads/writes (bsc#1258663).\n- CVE-2026-23941: improper handling of duplicate Content-Length headers in Erlang OTP can lead to HTTP request\n smuggling (bsc#1259687).\n- CVE-2026-23942: improper limitation of a pathname to a restricted directory in the SFTP server can lead to path\n traversal (bsc#1259681).\n- CVE-2026-23943: improper handling of highly compressed data in Erlang OTP ssh can lead to denial of service\n (bsc#1259682).\n- CVE-2026-28808: incorrect authorization can lead to unauthenticated access to protected CGI scripts (bsc#1261728).\n- CVE-2026-28810: predictable DNS transaction IDs can lead to DNS cache poisoning (bsc#1261726).\n- CVE-2026-32144: missing signature verification can lead to OCSP authorization bypass and information disclosure\n (bsc#1261734).\n\nOther updates and bugfixes:\n\n- jinterface: allow to build determenistic OtpErlang.jar (bsc#1262288).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-619",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20607-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1258663",
"url": "https://bugzilla.suse.com/1258663"
},
{
"category": "self",
"summary": "SUSE Bug 1259681",
"url": "https://bugzilla.suse.com/1259681"
},
{
"category": "self",
"summary": "SUSE Bug 1259682",
"url": "https://bugzilla.suse.com/1259682"
},
{
"category": "self",
"summary": "SUSE Bug 1259687",
"url": "https://bugzilla.suse.com/1259687"
},
{
"category": "self",
"summary": "SUSE Bug 1261726",
"url": "https://bugzilla.suse.com/1261726"
},
{
"category": "self",
"summary": "SUSE Bug 1261728",
"url": "https://bugzilla.suse.com/1261728"
},
{
"category": "self",
"summary": "SUSE Bug 1261734",
"url": "https://bugzilla.suse.com/1261734"
},
{
"category": "self",
"summary": "SUSE Bug 1262288",
"url": "https://bugzilla.suse.com/1262288"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-21620 page",
"url": "https://www.suse.com/security/cve/CVE-2026-21620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23941 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23942 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23943 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-28808 page",
"url": "https://www.suse.com/security/cve/CVE-2026-28808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-28810 page",
"url": "https://www.suse.com/security/cve/CVE-2026-28810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-32144 page",
"url": "https://www.suse.com/security/cve/CVE-2026-32144/"
}
],
"title": "Security update for erlang",
"tracking": {
"current_release_date": "2026-04-22T10:52:20Z",
"generator": {
"date": "2026-04-22T10:52:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20607-1",
"initial_release_date": "2026-04-22T10:52:20Z",
"revision_history": [
{
"date": "2026-04-22T10:52:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-debugger-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-debugger-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-debugger-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-debugger-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-dialyzer-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-dialyzer-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-diameter-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-diameter-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-diameter-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-diameter-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-doc-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-doc-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-doc-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-epmd-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-et-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-et-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-et-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-et-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-et-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-et-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-jinterface-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-jinterface-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-jinterface-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-observer-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-observer-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-observer-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-observer-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-observer-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-observer-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-reltool-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-reltool-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-reltool-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-reltool-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-src-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-wx-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-wx-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-wx-27.1.3-160000.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "erlang-wx-src-27.1.3-160000.4.1.aarch64",
"product": {
"name": "erlang-wx-src-27.1.3-160000.4.1.aarch64",
"product_id": "erlang-wx-src-27.1.3-160000.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-debugger-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-debugger-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-debugger-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-debugger-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-dialyzer-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-diameter-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-diameter-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-diameter-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-diameter-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-doc-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-doc-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-doc-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-epmd-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-et-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-et-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-et-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-et-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-et-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-et-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-jinterface-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-jinterface-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-observer-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-observer-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-observer-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-observer-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-reltool-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-reltool-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-reltool-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-reltool-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-src-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-wx-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-wx-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-wx-27.1.3-160000.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"product": {
"name": "erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"product_id": "erlang-wx-src-27.1.3-160000.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-27.1.3-160000.4.1.s390x",
"product_id": "erlang-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-debugger-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-debugger-27.1.3-160000.4.1.s390x",
"product_id": "erlang-debugger-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-debugger-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-debugger-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.s390x",
"product_id": "erlang-dialyzer-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-dialyzer-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-diameter-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-diameter-27.1.3-160000.4.1.s390x",
"product_id": "erlang-diameter-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-diameter-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-diameter-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.s390x",
"product_id": "erlang-epmd-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-et-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-et-27.1.3-160000.4.1.s390x",
"product_id": "erlang-et-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-et-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-et-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-et-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-jinterface-27.1.3-160000.4.1.s390x",
"product_id": "erlang-jinterface-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-jinterface-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-observer-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-observer-27.1.3-160000.4.1.s390x",
"product_id": "erlang-observer-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-observer-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-observer-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-observer-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-reltool-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-reltool-27.1.3-160000.4.1.s390x",
"product_id": "erlang-reltool-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-reltool-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-reltool-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-src-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-wx-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-wx-27.1.3-160000.4.1.s390x",
"product_id": "erlang-wx-27.1.3-160000.4.1.s390x"
}
},
{
"category": "product_version",
"name": "erlang-wx-src-27.1.3-160000.4.1.s390x",
"product": {
"name": "erlang-wx-src-27.1.3-160000.4.1.s390x",
"product_id": "erlang-wx-src-27.1.3-160000.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "erlang-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-debugger-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-debugger-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-debugger-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-debugger-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-dialyzer-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-dialyzer-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-diameter-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-diameter-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-diameter-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-diameter-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-doc-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-doc-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-doc-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-epmd-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-et-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-et-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-et-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-et-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-et-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-et-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-jinterface-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-jinterface-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-jinterface-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-observer-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-observer-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-observer-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-observer-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-observer-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-observer-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-reltool-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-reltool-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-reltool-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-reltool-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-src-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-wx-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-wx-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-wx-27.1.3-160000.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "erlang-wx-src-27.1.3-160000.4.1.x86_64",
"product": {
"name": "erlang-wx-src-27.1.3-160000.4.1.x86_64",
"product_id": "erlang-wx-src-27.1.3-160000.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-debugger-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-debugger-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-debugger-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-debugger-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-debugger-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-debugger-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-dialyzer-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-dialyzer-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-diameter-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-diameter-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-diameter-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-diameter-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-diameter-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-diameter-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-doc-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-doc-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-doc-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-doc-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-doc-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-doc-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-epmd-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-epmd-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-et-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-et-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-et-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-et-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-et-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-et-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-et-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-et-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-et-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-jinterface-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-jinterface-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-jinterface-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-jinterface-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-observer-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-observer-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-observer-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-observer-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-observer-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-observer-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-observer-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-observer-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-reltool-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-reltool-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-reltool-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-reltool-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-reltool-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-reltool-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-wx-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-wx-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-wx-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-wx-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-src-27.1.3-160000.4.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64"
},
"product_reference": "erlang-wx-src-27.1.3-160000.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-src-27.1.3-160000.4.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le"
},
"product_reference": "erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-src-27.1.3-160000.4.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x"
},
"product_reference": "erlang-wx-src-27.1.3-160000.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "erlang-wx-src-27.1.3-160000.4.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
},
"product_reference": "erlang-wx-src-27.1.3-160000.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-21620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-21620"
}
],
"notes": [
{
"category": "general",
"text": "Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl.\n\nThis issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-21620",
"url": "https://www.suse.com/security/cve/CVE-2026-21620"
},
{
"category": "external",
"summary": "SUSE Bug 1258663 for CVE-2026-21620",
"url": "https://bugzilla.suse.com/1258663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "important"
}
],
"title": "CVE-2026-21620"
},
{
"cve": "CVE-2026-23941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23941"
}
],
"notes": [
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling.\n\nThis vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7.\n\nThe server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23941",
"url": "https://www.suse.com/security/cve/CVE-2026-23941"
},
{
"category": "external",
"summary": "SUSE Bug 1259687 for CVE-2026-23941",
"url": "https://bugzilla.suse.com/1259687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23941"
},
{
"cve": "CVE-2026-23942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23942"
}
],
"notes": [
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal.\n\nThis vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2.\n\nThe SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23942",
"url": "https://www.suse.com/security/cve/CVE-2026-23942"
},
{
"category": "external",
"summary": "SUSE Bug 1259681 for CVE-2026-23942",
"url": "https://bugzilla.suse.com/1259681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23942"
},
{
"cve": "CVE-2026-23943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23943"
}
],
"notes": [
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion.\n\nThe SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS.\n\nTwo compression algorithms are affected:\n\n* zlib: Activates immediately after key exchange, enabling unauthenticated attacks\n* zlib@openssh.com: Activates post-authentication, enabling authenticated attacks\n\nEach SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments.\n\nThis vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23943",
"url": "https://www.suse.com/security/cve/CVE-2026-23943"
},
{
"category": "external",
"summary": "SUSE Bug 1259682 for CVE-2026-23943",
"url": "https://bugzilla.suse.com/1259682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23943"
},
{
"cve": "CVE-2026-28808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-28808"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect Authorization vulnerability in Erlang OTP (inets modules) allows unauthenticated access to CGI scripts protected by directory rules when served via script_alias.\n\nWhen script_alias maps a URL prefix to a directory outside DocumentRoot, mod_auth evaluates directory-based access controls against the DocumentRoot-relative path while mod_cgi executes the script at the ScriptAlias-resolved path. This path mismatch allows unauthenticated access to CGI scripts that directory rules were meant to protect.\n\nThis vulnerability is associated with program files lib/inets/src/http_server/mod_alias.erl, lib/inets/src/http_server/mod_auth.erl, and lib/inets/src/http_server/mod_cgi.erl.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.2, 27.3.4.10 and 26.2.5.19 corresponding to inets from 5.10 until 9.6.2, 9.3.2.4 and 9.1.0.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-28808",
"url": "https://www.suse.com/security/cve/CVE-2026-28808"
},
{
"category": "external",
"summary": "SUSE Bug 1261728 for CVE-2026-28808",
"url": "https://bugzilla.suse.com/1261728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "important"
}
],
"title": "CVE-2026-28808"
},
{
"cve": "CVE-2026-28810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-28810"
}
],
"notes": [
{
"category": "general",
"text": "Generation of Predictable Numbers or Identifiers vulnerability in Erlang/OTP kernel (inet_res, inet_db modules) allows DNS Cache Poisoning.\n\nThe built-in DNS resolver (inet_res) uses a sequential, process-global 16-bit transaction ID for UDP queries and does not implement source port randomization. Response validation relies almost entirely on this ID, making DNS cache poisoning practical for an attacker who can observe one query or predict the next ID. This conflicts with RFC 5452 recommendations for mitigating forged DNS answers.\n\ninet_res is intended for use in trusted network environments and with trusted recursive resolvers. Earlier documentation did not clearly state this deployment assumption, which could lead users to deploy the resolver in environments where spoofed DNS responses are possible.\n\nThis vulnerability is associated with program files lib/kernel/src/inet_db.erl and lib/kernel/src/inet_res.erl.\n\nThis issue affects OTP from OTP 17.0 until OTP 28.4.2, 27.3.4.10 and 26.2.5.19 corresponding to kernel from 3.0 until 10.6.2, 10.2.7.4 and 9.2.4.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-28810",
"url": "https://www.suse.com/security/cve/CVE-2026-28810"
},
{
"category": "external",
"summary": "SUSE Bug 1261726 for CVE-2026-28810",
"url": "https://bugzilla.suse.com/1261726"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-28810"
},
{
"cve": "CVE-2026-32144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-32144"
}
],
"notes": [
{
"category": "general",
"text": "Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification.\n\nThe OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate\u0027s issuer name matches the CA\u0027s subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid.\n\nThis affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context.\n\nThis vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3.\n\nThis issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-32144",
"url": "https://www.suse.com/security/cve/CVE-2026-32144"
},
{
"category": "external",
"summary": "SUSE Bug 1261734 for CVE-2026-32144",
"url": "https://bugzilla.suse.com/1261734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-debugger-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-dialyzer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-diameter-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-doc-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-epmd-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-et-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-jinterface-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-observer-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-reltool-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-src-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-27.1.3-160000.4.1.x86_64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.aarch64",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.ppc64le",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.s390x",
"openSUSE Leap 16.0:erlang-wx-src-27.1.3-160000.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-22T10:52:20Z",
"details": "important"
}
],
"title": "CVE-2026-32144"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…