Patch Package: OTP 26.2.5.15
Git Tag: OTP-26.2.5.15
Date: 2025-09-10
Trouble Report Id: OTP-19701, OTP-19729, OTP-19741, OTP-19742,
OTP-19748, OTP-19760
Seq num: CVE-2025-48038, CVE-2025-48039,
CVE-2025-48040, CVE-2025-48041, GH-10065,
GH-3392, PR-10120, PR-10155, PR-10156,
PR-10157, PR-10162, PR-6223
System: OTP
Release: 26
Application: inets-9.1.0.3, ssh-5.1.4.12
Predecessor: OTP 26.2.5.14
Check out the git tag OTP-26.2.5.15, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- POTENTIAL INCOMPATIBILITIES -------------------------------------
---------------------------------------------------------------------
OTP-19701 Application(s): ssh
Related Id(s): PR-10157, CVE-2025-48041
Option max_handles can be configured for sshd running
SFTP. The positive integer value limits amount of file
handles opened for a connection (by default 4096 is
used).
OTP-19741 Application(s): ssh
Related Id(s): PR-10162, CVE-2025-48040
Avoid decoding KEX messages providing too many
algorithms. This change does not introduce new
limitation but assures it is enforced earlier in
processing chain. Adjustments in error logging during
handshake.
OTP-19742 Application(s): ssh
Related Id(s): PR-10155, CVE-2025-48039
A new 'max_path' option is now available in the sshd
configuration, allowing administrators to set the
maximum allowable path length. By default, this value
is set to 4096 characters.
OTP-19748 Application(s): ssh
Related Id(s): PR-10156, CVE-2025-48038
Reject file handles exceeding size specified in RFCs
(256 bytes).
---------------------------------------------------------------------
--- inets-9.1.0.3 ---------------------------------------------------
---------------------------------------------------------------------
The inets-9.1.0.3 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-19729 Application(s): inets
Related Id(s): GH-3392, PR-6223
Fixed a bug where a request sent to httpd server which
is using CGI script to generate a response, would
pollute server's environment variable - HTTP_PROXY for
that request. This bug is also known as httpoxy. More
information: CVE-2016-1000107
OTP-19760 Application(s): inets
Related Id(s): GH-10065, PR-10120
Fixed a RFC 2616 violation, where a http request, made
by httpc, without providing any options, would be sent
with an empty TE header, without also having a TE value
in the connection header. Now the default request
doesn't send a TE header at all.
Full runtime dependencies of inets-9.1.0.3: erts-14.0, kernel-9.0,
mnesia-4.12, public_key-1.13, runtime_tools-1.8.14, ssl-9.0,
stdlib-5.0, stdlib-5.0
---------------------------------------------------------------------
--- ssh-5.1.4.12 ----------------------------------------------------
---------------------------------------------------------------------
The ssh-5.1.4.12 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-19701 Application(s): ssh
Related Id(s): PR-10157, CVE-2025-48041
*** POTENTIAL INCOMPATIBILITY ***
Option max_handles can be configured for sshd running
SFTP. The positive integer value limits amount of file
handles opened for a connection (by default 4096 is
used).
OTP-19741 Application(s): ssh
Related Id(s): PR-10162, CVE-2025-48040
*** POTENTIAL INCOMPATIBILITY ***
Avoid decoding KEX messages providing too many
algorithms. This change does not introduce new
limitation but assures it is enforced earlier in
processing chain. Adjustments in error logging during
handshake.
OTP-19742 Application(s): ssh
Related Id(s): PR-10155, CVE-2025-48039
*** POTENTIAL INCOMPATIBILITY ***
A new 'max_path' option is now available in the sshd
configuration, allowing administrators to set the
maximum allowable path length. By default, this value
is set to 4096 characters.
OTP-19748 Application(s): ssh
Related Id(s): PR-10156, CVE-2025-48038
*** POTENTIAL INCOMPATIBILITY ***
Reject file handles exceeding size specified in RFCs
(256 bytes).
Full runtime dependencies of ssh-5.1.4.12: crypto-5.0, erts-14.0,
kernel-9.0, public_key-1.6.1, runtime_tools-1.15.1, stdlib-5.0,
stdlib-5.0
---------------------------------------------------------------------
--- Thanks to -------------------------------------------------------
---------------------------------------------------------------------
Marcel Lanz, Savvas Nicholas
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------