In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
References
| Link | Resource |
|---|---|
| https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json | Vendor Advisory |
| https://osv.dev/vulnerability/OSEC-2026-01 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Mar 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ocaml
Ocaml ocaml |
|
| CPE | cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:* | |
| References | () https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json - Vendor Advisory | |
| References | () https://osv.dev/vulnerability/OSEC-2026-01 - Third Party Advisory |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 04:16
Updated : 2026-03-06 19:15
NVD link : CVE-2026-28364
Mitre link : CVE-2026-28364
CVE.ORG link : CVE-2026-28364
JSON object : View
Products Affected
ocaml
- ocaml
CWE
CWE-126
Buffer Over-read
