[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Erlang - (bulletinjul2017)

ID: oval:org.secpod.oval:def:2101252Date: (C)2019-12-31   (M)2023-03-01
Class: PATCHFamily: unix




An issue was discovered in Erlang/OTP 18.x. Erlang"s generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

Platform:
Sun Solaris 11
Product:
runtime/erlang
runtime/erlang/documentation
Reference:
bulletinjul2017
CVE-2016-10253
CVE-2015-2774
CVE    2
CVE-2016-10253
CVE-2015-2774
CPE    2
cpe:/o:oracle:solaris:11
cpe:/o:oracle:solaris:11.2

© SecPod Technologies