UBUNTU-CVE-2025-46712

Source
https://ubuntu.com/security/CVE-2025-46712
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-46712.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-46712
Related
Published
2025-05-08T20:15:00Z
Modified
2025-06-03T18:01:28Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during the handshake. This issue has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25).

References

Affected packages

Ubuntu:Pro:14.04:LTS / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:16.b.3-dfsg-1ubuntu2.2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:16.*

1:16.b.1-dfsg-4ubuntu1
1:16.b.2-dfsg-1ubuntu1
1:16.b.2-dfsg-2ubuntu1
1:16.b.3-dfsg-1ubuntu1
1:16.b.3-dfsg-1ubuntu2
1:16.b.3-dfsg-1ubuntu2.1
1:16.b.3-dfsg-1ubuntu2.2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:Pro:16.04:LTS / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:18.3-dfsg-1ubuntu3.1?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:18.*

1:18.0-dfsg-1ubuntu1
1:18.0-dfsg-1ubuntu2
1:18.2-dfsg-2ubuntu1
1:18.3-dfsg-1ubuntu1
1:18.3-dfsg-1ubuntu2
1:18.3-dfsg-1ubuntu3
1:18.3-dfsg-1ubuntu3.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:Pro:18.04:LTS / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:20.2.2+dfsg-1ubuntu2?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:20.*

1:20.0.4+dfsg-1ubuntu1
1:20.1.2+dfsg-1ubuntu1
1:20.1.3+dfsg-1ubuntu1
1:20.1.4+dfsg-1ubuntu1
1:20.1.5+dfsg-1ubuntu1
1:20.1.6+dfsg-1ubuntu1
1:20.1.7+dfsg-1ubuntu1
1:20.2.1+dfsg-1ubuntu1
1:20.2.2+dfsg-1ubuntu1
1:20.2.2+dfsg-1ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:Pro:20.04:LTS / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:22.2.7+dfsg-1ubuntu0.5?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:22.*

1:22.0.7+dfsg-1build1
1:22.2+dfsg-1
1:22.2.1+dfsg-1
1:22.2.2+dfsg-1
1:22.2.3+dfsg-1
1:22.2.3+dfsg-2
1:22.2.4+dfsg-1
1:22.2.7+dfsg-1
1:22.2.7+dfsg-1ubuntu0.2
1:22.2.7+dfsg-1ubuntu0.3
1:22.2.7+dfsg-1ubuntu0.4
1:22.2.7+dfsg-1ubuntu0.5

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:22.04:LTS / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:24.2.1+dfsg-1ubuntu0.4?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:23.*

1:23.2.6+dfsg-1build1

1:24.*

1:24.1.1+dfsg-1
1:24.1.4+dfsg-1
1:24.1.5+dfsg-1
1:24.1.5+dfsg-1ubuntu1
1:24.2+dfsg-1
1:24.2.1+dfsg-1
1:24.2.1+dfsg-1ubuntu0.1
1:24.2.1+dfsg-1ubuntu0.2
1:24.2.1+dfsg-1ubuntu0.3
1:24.2.1+dfsg-1ubuntu0.4

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:24.10 / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:25.3.2.12+dfsg-1ubuntu2.3?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:25.*

1:25.3.2.8+dfsg-1ubuntu4
1:25.3.2.12+dfsg-1ubuntu1
1:25.3.2.12+dfsg-1ubuntu2
1:25.3.2.12+dfsg-1ubuntu2.1
1:25.3.2.12+dfsg-1ubuntu2.2
1:25.3.2.12+dfsg-1ubuntu2.3

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:24.04:LTS / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:25.3.2.8+dfsg-1ubuntu4.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:25.*

1:25.2.3+dfsg-1
1:25.3.2.8+dfsg-1
1:25.3.2.8+dfsg-1ubuntu1
1:25.3.2.8+dfsg-1ubuntu3
1:25.3.2.8+dfsg-1ubuntu4
1:25.3.2.8+dfsg-1ubuntu4.1
1:25.3.2.8+dfsg-1ubuntu4.2
1:25.3.2.8+dfsg-1ubuntu4.3

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}

Ubuntu:25.04 / erlang

Package

Name
erlang
Purl
pkg:deb/ubuntu/erlang@1:27.3+dfsg-1ubuntu1.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:25.*

1:25.3.2.12+dfsg-1ubuntu2

1:27.*

1:27.2+dfsg-2
1:27.2.1+dfsg-1
1:27.2.1+dfsg-2
1:27.2.2+dfsg-1
1:27.2.3+dfsg-1
1:27.2.4+dfsg-1
1:27.3+dfsg-1
1:27.3+dfsg-1ubuntu1
1:27.3+dfsg-1ubuntu1.1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "Per upstream advisory, this is a low severity CVE"
}