https://bugzilla.redhat.com/show_bug.cgi?id=1433985

            Bug ID: 1433985
           Summary: CVE-2016-10253 erlang: Heap-buffer overflow via
                    regular expressions
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: medium
          Priority: medium
          Assignee: [email protected]
          Reporter: [email protected]
                CC: [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected],
                    [email protected], [email protected], [email protected]




An issue was discovered in Erlang/OTP Erlang's generation of compiled regular
expressions is vulnerable to a heap overflow. Regular expressions using a
malformed extpattern can indirectly specify an offset that is used as an array
index. This ordinal permits arbitrary regions within the erts_alloc arena to be
both read and written to. 

References:

https://github.com/erlang/otp/pull/1108

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
erlang mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to