Debian Package Tracker
Register | Log in
Subscribe

erlang

Concurrent, real-time, distributed functional language

Choose email to subscribe with

general
  • source: erlang (main)
  • version: 1:27.3.4.9+dfsg-1
  • maintainer: Debian Erlang Packagers (archive) (DMD)
  • uploaders: Sergei Golovan [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:23.2.6+dfsg-1+deb11u1
  • o-o-sec: 1:23.2.6+dfsg-1+deb11u3
  • oldstable: 1:25.2.3+dfsg-1+deb12u3
  • old-sec: 1:25.2.3+dfsg-1+deb12u1
  • stable: 1:27.3.4.1+dfsg-1+deb13u1
  • testing: 1:27.3.4.8+dfsg-1
  • unstable: 1:27.3.4.9+dfsg-1
  • exp: 1:29.0~rc1+dfsg-1
versioned links
  • 1:23.2.6+dfsg-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:23.2.6+dfsg-1+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:25.2.3+dfsg-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:25.2.3+dfsg-1+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:27.3.4.1+dfsg-1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:27.3.4.8+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:27.3.4.9+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:28.3.1+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:29.0~rc1+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • erlang (2 bugs: 0, 1, 1, 0)
  • erlang-asn1
  • erlang-base (2 bugs: 1, 0, 1, 0)
  • erlang-common-test
  • erlang-crypto
  • erlang-debugger
  • erlang-dev
  • erlang-dialyzer
  • erlang-diameter
  • erlang-doc
  • erlang-edoc
  • erlang-eldap
  • erlang-et
  • erlang-eunit (1 bugs: 0, 1, 0, 0)
  • erlang-examples
  • erlang-ftp
  • erlang-inets
  • erlang-jinterface
  • erlang-megaco
  • erlang-mnesia
  • erlang-mode (3 bugs: 0, 2, 1, 0)
  • erlang-nox
  • erlang-observer
  • erlang-odbc
  • erlang-os-mon
  • erlang-parsetools
  • erlang-public-key
  • erlang-reltool
  • erlang-runtime-tools
  • erlang-snmp
  • erlang-src
  • erlang-ssh
  • erlang-ssl
  • erlang-syntax-tools
  • erlang-tftp
  • erlang-tools
  • erlang-wx (1 bugs: 0, 1, 0, 0)
  • erlang-x11
  • erlang-xmerl
action needed
A new upstream version is available: 29.0-rc1 high
A new upstream version 29.0-rc1 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-03-18 04:31
4 security issues in trixie high

There are 4 open security issues in trixie.

3 important issues:
  • CVE-2026-23941: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling. This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7. The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.
  • CVE-2026-23942: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2. The SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
  • CVE-2026-23943: Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS. Two compression algorithms are affected: * zlib: Activates immediately after key exchange, enabling unauthenticated attacks * zlib@openssh.com: Activates post-authentication, enabling authenticated attacks Each SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments. This vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4. This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
1 issue left for the package maintainer to handle:
  • CVE-2026-21620: (needs triaging) Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-09-11 Last update: 2026-03-17 17:00
3 security issues in forky high

There are 3 open security issues in forky.

3 important issues:
  • CVE-2026-23941: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling. This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7. The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.
  • CVE-2026-23942: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2. The SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
  • CVE-2026-23943: Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS. Two compression algorithms are affected: * zlib: Activates immediately after key exchange, enabling unauthenticated attacks * zlib@openssh.com: Activates post-authentication, enabling authenticated attacks Each SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments. This vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4. This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
Created: 2026-02-21 Last update: 2026-03-17 17:00
6 security issues in bullseye high

There are 6 open security issues in bullseye.

4 important issues:
  • CVE-2026-21620: Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.
  • CVE-2026-23941: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling. This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7. The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.
  • CVE-2026-23942: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2. The SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
  • CVE-2026-23943: Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS. Two compression algorithms are affected: * zlib: Activates immediately after key exchange, enabling unauthenticated attacks * zlib@openssh.com: Activates post-authentication, enabling authenticated attacks Each SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments. This vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4. This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
2 issues postponed or untriaged:
  • CVE-2025-46712: (postponed; to be fixed through a stable update) Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during the handshake. This issue has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25).
  • CVE-2025-48040: (postponed; to be fixed through a stable update) Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Created: 2026-02-21 Last update: 2026-03-17 17:00
4 security issues in bookworm high

There are 4 open security issues in bookworm.

3 important issues:
  • CVE-2026-23941: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Erlang OTP (inets httpd module) allows HTTP Request Smuggling. This vulnerability is associated with program files lib/inets/src/http_server/httpd_request.erl and program routines httpd_request:parse_headers/7. The server does not reject or normalize duplicate Content-Length headers. The earliest Content-Length in the request is used for body parsing while common reverse proxies (nginx, Apache httpd, Envoy) honor the last Content-Length value. This violates RFC 9112 Section 6.3 and allows front-end/back-end desynchronization, leaving attacker-controlled bytes queued as the start of the next request. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to inets from 5.10 until 9.6.1, 9.3.2.3 and 9.1.0.5.
  • CVE-2026-23942: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (ssh_sftpd module) allows Path Traversal. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl and program routines ssh_sftpd:is_within_root/2. The SFTP server uses string prefix matching via lists:prefix/2 rather than proper path component validation when checking if a path is within the configured root directory. This allows authenticated users to access sibling directories that share a common name prefix with the configured root directory. For example, if root is set to /home/user1, paths like /home/user10 or /home/user1_backup would incorrectly be considered within the root. This issue affects OTP from OTP 17.0 until OTP 28.4.1, OTP 27.3.4.9 and OTP 26.2.5.18, corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
  • CVE-2026-23943: Improper Handling of Highly Compressed Data (Compression Bomb) vulnerability in Erlang OTP ssh (ssh_transport modules) allows Denial of Service via Resource Depletion. The SSH transport layer advertises legacy zlib compression by default and inflates attacker-controlled payloads pre-authentication without any size limit, enabling reliable memory exhaustion DoS. Two compression algorithms are affected: * zlib: Activates immediately after key exchange, enabling unauthenticated attacks * zlib@openssh.com: Activates post-authentication, enabling authenticated attacks Each SSH packet can decompress ~255 MB from 256 KB of wire data (1029:1 amplification ratio). Multiple packets can rapidly exhaust available memory, causing OOM kills in memory-constrained environments. This vulnerability is associated with program files lib/ssh/src/ssh_transport.erl and program routines ssh_transport:decompress/2, ssh_transport:handle_packet_part/4. This issue affects OTP from OTP 17.0 until OTP 28.4.1, 27.3.4.9 and 26.2.5.18 corresponding to ssh from 3.0.1 until 5.5.1, 5.2.11.6 and 5.1.4.14.
1 issue left for the package maintainer to handle:
  • CVE-2026-21620: (needs triaging) Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl, src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp: from 5.10 before 7.0; otp: from 1.0.

You can find information about how to handle this issue in the security team's documentation.

4 issues that should be fixed with the next stable update:
  • CVE-2025-48038: Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
  • CVE-2025-48039: Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
  • CVE-2025-48040: Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
  • CVE-2025-48041: Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
Created: 2026-02-21 Last update: 2026-03-17 17:00
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-05-21 Last update: 2026-03-17 10:00
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2018-09-11 Last update: 2026-03-18 04:32
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-06 Last update: 2026-03-18 04:00
3 open merge requests in Salsa normal
There are 3 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2026-02-16 Last update: 2026-03-10 09:32
debian/patches: 6 patches to forward upstream low

Among the 6 debian patches available in version 1:27.3.4.9+dfsg-1 of the package, we noticed the following issues:

  • 6 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-17 23:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2026-03-17 19:00
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for erlang (1:27.3.4.8+dfsg-1 to 1:27.3.4.9+dfsg-1): BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below)
    • Issues preventing migration:
    • ∙ ∙ Missing build on riscv64
    • ∙ ∙ Autopkgtest deferred on riscv64: missing arch:riscv64 build
    • ∙ ∙ Autopkgtest for ejabberd/24.12-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for elixir-lang/1.18.3.dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for erlang-mimerl/1.4.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for rabbitmq-server/4.0.5-13: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for rebar3/3.27.0-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Autopkgtest for sonic-pi/3.2.2~repack-12.1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered, s390x: Test triggered
    • ∙ ∙ Lintian check waiting for test results - info
    • ∙ ∙ Too young, only 1 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/e/erlang.html
    • ∙ ∙ Reproducibility regression on amd64: erlang-ssh
    • ∙ ∙ Reproducibility check waiting for results on arm64
    • ∙ ∙ Reproducibility check waiting for results on armhf
    • ∙ ∙ Reproducibility check waiting for results on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-03-17] Accepted erlang 1:27.3.4.9+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2026-03-16] erlang 1:27.3.4.8+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-10] Accepted erlang 1:29.0~rc1+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2026-03-10] Accepted erlang 1:27.3.4.8+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2026-03-03] Accepted erlang 1:27.3.4.1+dfsg-1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Jochen Sprickerhof)
  • [2026-01-15] Accepted erlang 1:28.3.1+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-12-23] Accepted erlang 1:28.3+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-12-02] erlang 1:27.3.4.6+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-27] Accepted erlang 1:28.2+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-11-27] Accepted erlang 1:27.3.4.6+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2025-11-24] Accepted erlang 1:23.2.6+dfsg-1+deb11u3 (source) into oldoldstable-security (Jochen Sprickerhof)
  • [2025-11-05] erlang 1:27.3.4.4+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-31] Accepted erlang 1:27.3.4.4+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2025-10-31] Accepted erlang 1:28.1.1+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-09-21] erlang 1:27.3.4.3+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-09-15] Accepted erlang 1:28.0.4+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-09-15] Accepted erlang 1:27.3.4.3+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2025-08-31] Accepted erlang 1:25.2.3+dfsg-1+deb12u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Sergei Golovan)
  • [2025-08-22] Accepted erlang 1:25.2.3+dfsg-1+deb12u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Sergei Golovan)
  • [2025-07-20] Accepted erlang 1:28.0.2+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-07-17] erlang 1:27.3.4.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-07-08] Accepted erlang 1:27.3.4.1+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2025-06-16] Accepted erlang 1:28.0.1+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-06-02] erlang 1:27.3.4+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-21] Accepted erlang 1:28.0+dfsg-1 (source) into experimental (Sergei Golovan)
  • [2025-05-09] Accepted erlang 1:27.3.4+dfsg-1 (source) into unstable (Sergei Golovan)
  • [2025-04-21] Accepted erlang 1:25.2.3+dfsg-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Sergei Golovan)
  • [2025-04-20] Accepted erlang 1:23.2.6+dfsg-1+deb11u2 (source) into oldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-04-20] Accepted erlang 1:25.2.3+dfsg-1+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Sergei Golovan)
  • [2025-04-18] erlang 1:27.3.3+dfsg-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 12
  • RC: 1
  • I&N: 7
  • M&W: 4
  • F&P: 0
  • patch: 1
links
  • homepage
  • buildd: logs, exp, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:27.3.4.6+dfsg-1
  • 31 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing