Memory Consumption Flaw in Erlang/OTP Affecting Multiple Versions
CVE-2025-30211
What is CVE-2025-30211?
Erlang/OTP prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19 is susceptible to a memory consumption vulnerability triggered by malformed KEX init messages. The implementation fails to limit the length of algorithm names in accordance with RFC standards (64 characters), potentially leading to excessive memory allocation and inefficient processing of error data. This can severely impact system performance. Users are advised to upgrade to the latest versions to mitigate this risk. Alternatively, it is recommended to disable parallel login by adjusting the 'parallel_login' option to 'false' and to reduce the 'max_sessions' configuration.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
otp < OTP-27.3.1 < OTP-27.3.1
otp < OTP-26.2.5.10 < OTP-26.2.5.10
otp < OTP-25.3.2.19 < OTP-25.3.2.19
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
