Name | CVE-2025-4748 |
Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed. This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1107939 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
erlang (PTS) | bullseye | 1:23.2.6+dfsg-1+deb11u1 | vulnerable |
bullseye (security) | 1:23.2.6+dfsg-1+deb11u2 | vulnerable | |
bookworm, bookworm (security) | 1:25.2.3+dfsg-1+deb12u1 | vulnerable | |
trixie | 1:27.3.4+dfsg-1 | vulnerable | |
sid | 1:27.3.4.1+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
erlang | source | (unstable) | 1:27.3.4.1+dfsg-1 | 1107939 |
[bookworm] - erlang <no-dsa> (Minor issue, will be fixed via spu)
https://github.com/erlang/otp/security/advisories/GHSA-9g37-pgj9-wrhc
https://github.com/erlang/otp/pull/9941
https://github.com/erlang/otp/commit/10608879c81332af2d3c00db61ee173c93c1ea4e (OTP-26.2.5.13, OTP-27.3.4.1)