CVE-2026-21620

NameCVE-2026-21620
DescriptionRelative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
erlang (PTS)bullseye1:23.2.6+dfsg-1+deb11u1vulnerable
bullseye (security)1:23.2.6+dfsg-1+deb11u3vulnerable
bookworm1:25.2.3+dfsg-1+deb12u3vulnerable
bookworm (security)1:25.2.3+dfsg-1+deb12u1vulnerable
trixie1:27.3.4.1+dfsg-1vulnerable
forky, sid1:27.3.4.6+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
erlangsource(unstable)(unfixed)

Notes

https://github.com/erlang/otp/security/advisories/GHSA-hmrc-prh3-rpvp
https://github.com/erlang/otp/pull/10706
Fixed by (merge): https://github.com/erlang/otp/commit/696fdec922661d4a3cc528fc34bc24fae8d4ad8a (OTP-28.3.2)
Fixed by (merge): https://github.com/erlang/otp/commit/3970738f687325138eb75f798054fa8960ac354e (OTP-27.3.4.8)
Fixed by (merge): https://github.com/erlang/otp/commit/655fb95725ba2fb811740b57e106873833824344 (OTP-26.2.5.17)

Search for package or bug name: Reporting problems