First published: Fri Mar 28 2025(Updated: )
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19, a maliciously formed KEX init message can result with high memory usage. Implementation does not verify RFC specified limits on algorithm names (64 characters) provided in KEX init message. Big KEX init packet may lead to inefficient processing of the error data. As a result, large amount of memory will be allocated for processing malicious data. Versions OTP-27.3.1, OTP-26.2.5.10, and OTP-25.3.2.19 fix the issue. Some workarounds are available. One may set option `parallel_login` to `false` and/or reduce the `max_sessions` option.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Erlang/OTP | <27.3.1<26.2.5.10<25.3.2.19 | |
debian/erlang | <=1:23.2.6+dfsg-1+deb11u1<=1:25.2.3+dfsg-1 | 1:27.3.1+dfsg-1 1:27.3.2+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30211 is considered a high-severity vulnerability due to its potential impact on memory usage and denial of service.
To fix CVE-2025-30211, upgrade to Erlang/OTP version OTP-27.3.1, 26.2.5.10, or 25.3.2.19 or later.
CVE-2025-30211 affects versions of Erlang/OTP prior to OTP-27.3.1, 26.2.5.10, and 25.3.2.19.
CVE-2025-30211 can lead to high memory usage by applications using affected versions of Erlang/OTP, potentially causing slowdowns or crashes.
CVE-2025-30211 is not a remote code execution vulnerability but can lead to denial of service due to excessive resource consumption.