Memory Consumption Flaw in Erlang/OTP Affecting Multiple Versions
CVE-2025-30211
7.5HIGH
What is CVE-2025-30211?
Erlang/OTP prior to versions OTP-27.3.1, 26.2.5.10, and 25.3.2.19 is susceptible to a memory consumption vulnerability triggered by malformed KEX init messages. The implementation fails to limit the length of algorithm names in accordance with RFC standards (64 characters), potentially leading to excessive memory allocation and inefficient processing of error data. This can severely impact system performance. Users are advised to upgrade to the latest versions to mitigate this risk. Alternatively, it is recommended to disable parallel login by adjusting the 'parallel_login' option to 'false' and to reduce the 'max_sessions' configuration.
Affected Version(s)
otp < OTP-27.3.1 < OTP-27.3.1
otp < OTP-26.2.5.10 < OTP-26.2.5.10
otp < OTP-25.3.2.19 < OTP-25.3.2.19
