CVE-2026-28364

high

Description

Debian Linux - ocaml - In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data. Red Hat Enterprise Linux - ocaml: OCaml: Remote code execution via buffer over-read in Marshal deserialization Ubuntu Linux - In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

References

https://osv.dev/vulnerability/OSEC-2026-01

https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json

Details

Source: Mitre, NVD

Risk Information

CVSS v2

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 7.9

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

Severity: High