Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4132-1 | erlang security update |
![]() |
DSA-5906-1 | erlang security update |
![]() |
EUVD-2025-14809 | Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient processing of the error data. As a result, large amount of memory will be allocated for processing malicious data. Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the issue. Some workarounds are available. One may set option `parallel_login` to `false` and/or reduce the `max_sessions` option. |
![]() |
USN-7425-1 | Erlang vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 02 Apr 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 28 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Mar 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient processing of the error data. As a result, large amount of memory will be allocated for processing malicious data. Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the issue. Some workarounds are available. One may set option `parallel_login` to `false` and/or reduce the `max_sessions` option. | |
Title | KEX init error results with excessive memory usage | |
Weaknesses | CWE-789 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-28T15:10:37.128Z
Reserved: 2025-03-18T18:15:13.850Z
Link: CVE-2025-30211

Updated: 2025-03-28T15:10:26.011Z

Status : Awaiting Analysis
Published: 2025-03-28T15:15:50.863
Modified: 2025-03-28T18:11:40.180
Link: CVE-2025-30211


Updated: 2025-07-12T15:26:05Z