Erlang is vulnerable to buffer overflow. An attacker may use a malformed extpattern to indirectly specify an offset that is used as an array index.
CPE | Name | Operator | Version |
---|---|---|---|
erlang:stretch | eq | 1:19.2.1+dfsg-2+deb9u3 | |
erlang:stretch | eq | 1:19.2.1+dfsg-2+deb9u3 |