openSUSE 16 Security Update : erlang (openSUSE-SU-2026:20607-1)

high Nessus Plugin ID 310082

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2026:20607-1 advisory.

Security issues fixed:

- CVE-2026-21620: improper isolation and compartmentalization can lead to TFTP relative path traversal and remote arbitrary reads/writes (bsc#1258663).
- CVE-2026-23941: improper handling of duplicate Content-Length headers in Erlang OTP can lead to HTTP request smuggling (bsc#1259687).
- CVE-2026-23942: improper limitation of a pathname to a restricted directory in the SFTP server can lead to path traversal (bsc#1259681).
- CVE-2026-23943: improper handling of highly compressed data in Erlang OTP ssh can lead to denial of service (bsc#1259682).
- CVE-2026-28808: incorrect authorization can lead to unauthenticated access to protected CGI scripts (bsc#1261728).
- CVE-2026-28810: predictable DNS transaction IDs can lead to DNS cache poisoning (bsc#1261726).
- CVE-2026-32144: missing signature verification can lead to OCSP authorization bypass and information disclosure (bsc#1261734).

Other updates and bugfixes:

- jinterface: allow to build determenistic OtpErlang.jar (bsc#1262288).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1258663

https://bugzilla.suse.com/1259681

https://bugzilla.suse.com/1259682

https://bugzilla.suse.com/1259687

https://bugzilla.suse.com/1261726

https://bugzilla.suse.com/1261728

https://bugzilla.suse.com/1261734

https://bugzilla.suse.com/1262288

https://www.suse.com/security/cve/CVE-2026-21620

https://www.suse.com/security/cve/CVE-2026-23941

https://www.suse.com/security/cve/CVE-2026-23942

https://www.suse.com/security/cve/CVE-2026-23943

https://www.suse.com/security/cve/CVE-2026-28808

https://www.suse.com/security/cve/CVE-2026-28810

https://www.suse.com/security/cve/CVE-2026-32144

Plugin Details

Severity: High

ID: 310082

File Name: openSUSE-2026-20607-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 4/24/2026

Updated: 4/24/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-28808

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 8.3

Threat Score: 4.8

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:erlang-et, p-cpe:/a:novell:opensuse:erlang-wx-src, p-cpe:/a:novell:opensuse:erlang-src, p-cpe:/a:novell:opensuse:erlang-diameter-src, p-cpe:/a:novell:opensuse:erlang-observer-src, p-cpe:/a:novell:opensuse:erlang-et-src, p-cpe:/a:novell:opensuse:erlang-jinterface-src, p-cpe:/a:novell:opensuse:erlang-diameter, p-cpe:/a:novell:opensuse:erlang-debugger-src, p-cpe:/a:novell:opensuse:erlang-observer, p-cpe:/a:novell:opensuse:erlang-dialyzer-src, p-cpe:/a:novell:opensuse:erlang-jinterface, p-cpe:/a:novell:opensuse:erlang, p-cpe:/a:novell:opensuse:erlang-debugger, p-cpe:/a:novell:opensuse:erlang-reltool, cpe:/o:novell:opensuse:16.0, p-cpe:/a:novell:opensuse:erlang-reltool-src, p-cpe:/a:novell:opensuse:erlang-dialyzer, p-cpe:/a:novell:opensuse:erlang-wx, p-cpe:/a:novell:opensuse:erlang-epmd

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/22/2026

Vulnerability Publication Date: 2/20/2026

Reference Information

CVE: CVE-2026-21620, CVE-2026-23941, CVE-2026-23942, CVE-2026-23943, CVE-2026-28808, CVE-2026-28810, CVE-2026-32144

IAVA: 2026-A-0204-S, 2026-A-0309