Your submission was sent successfully! Close

CVE-2016-10253

Published: 18 March 2017

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

Priority

Low

CVSS 3 base score: 9.8

Status

Package Release Status
erlang
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:18.3-dfsg-1ubuntu3.1)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(code not present)