MGASA-2019-0124

Source
https://advisories.mageia.org/MGASA-2019-0124.html
Import Source
https://advisories.mageia.org/MGASA-2019-0124.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0124
Related
Published
2019-04-05T18:12:59Z
Modified
2019-04-05T17:35:31Z
Summary
Updated ocaml packages fix security vulnerability
Details

The camlbadeserialize function in byterun/bigarray.c in the standard library in OCaml 4.06.0 has an integer overflow which, in situations where marshalled data is accepted from an untrusted source, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted object. (CVE-2018-9838)

References
Credits

Affected packages

Mageia:6 / ocaml

Package

Name
ocaml
Purl
pkg:rpm/mageia/ocaml?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.02.3-6.1.mga6

Ecosystem specific

{
    "section": "core"
}