| Name | CVE-2026-21619 |
| Description | Uncontrolled Resource Consumption, Deserialization of Untrusted Data vulnerability in hexpm hex_core (hex_api modules), hexpm hex (mix_hex_api modules), erlang rebar3 (r3_hex_api modules) allows Object Injection, Excessive Allocation. This vulnerability is associated with program files src/hex_api.erl, src/mix_hex_api.erl, apps/rebar/src/vendored/r3_hex_api.erl and program routines hex_core:request/4, mix_hex_api:request/4, r3_hex_api:request/4. This issue affects hex_core: from 0.1.0 before 0.12.1; hex: from 2.3.0 before 2.3.2; rebar3: from 3.9.1 before 3.27.0. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| erlang-hex (PTS) | forky, sid, trixie | 2.0.6-2 | vulnerable |
| rebar3 (PTS) | bookworm | 3.19.0-1 | vulnerable |
| trixie | 3.24.0-1 | vulnerable | |
| forky, sid | 3.27.0-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| erlang-hex | source | (unstable) | (unfixed) | |||
| rebar3 | source | (unstable) | 3.27.0-1 |
https://github.com/advisories/GHSA-hx9w-f2w9-9g96
https://github.com/hexpm/hex_core/commit/cdf726095bca85ad2549d146df1e831ae93c2b13 (v0.12.1)
https://github.com/hexpm/hex/commit/636739f3322514e9303ca335fb630696fcbb3c95 (v2.3.2)
https://github.com/erlang/rebar3/commit/1d4478f527e373de0b225951e53115450e0d9b9d (3.27.0)