https://bugzilla.redhat.com/show_bug.cgi?id=1433985
Bug ID: 1433985
Summary: CVE-2016-10253 erlang: Heap-buffer overflow via
regular expressions
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: [email protected]
Reporter: [email protected]
CC: [email protected], [email protected],
[email protected], [email protected],
[email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected], [email protected]
An issue was discovered in Erlang/OTP Erlang's generation of compiled regular
expressions is vulnerable to a heap overflow. Regular expressions using a
malformed extpattern can indirectly specify an offset that is used as an array
index. This ordinal permits arbitrary regions within the erts_alloc arena to be
both read and written to.
References:
https://github.com/erlang/otp/pull/1108
--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
erlang mailing list -- [email protected]
To unsubscribe send an email to [email protected]