CVE-2026-28364

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:*
cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:*

History

06 Mar 2026, 19:15

Type Values Removed Values Added
First Time Ocaml
Ocaml ocaml
CPE cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:*
References () https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json - () https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json - Vendor Advisory
References () https://osv.dev/vulnerability/OSEC-2026-01 - () https://osv.dev/vulnerability/OSEC-2026-01 - Third Party Advisory

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) En OCaml anterior a 4.14.3 y 5.x anterior a 5.4.1, un desbordamiento de lectura de búfer en la deserialización de Marshal (runtime/intern.c) permite la ejecución remota de código a través de una cadena de ataque multifase. La vulnerabilidad radica en la falta de validación de límites en la función readblock(), que realiza operaciones memcpy() sin límites utilizando longitudes controladas por el atacante a partir de datos Marshal manipulados.

27 Feb 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 04:16

Updated : 2026-03-06 19:15


NVD link : CVE-2026-28364

Mitre link : CVE-2026-28364

CVE.ORG link : CVE-2026-28364


JSON object : View

Products Affected

ocaml

  • ocaml
CWE
CWE-126

Buffer Over-read