Moderate CentOS ocaml Security Update

Metadata

medium
6.4
ocaml-4.01.0-22.7.el7_2.src.rpm, ocaml-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm, ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm
CVE-2015-8869
rhn.redhat.com, lists.centos.org
2016-06-23
2017-07-27 19:11
Moderate CentOS libguestfs Security Update
CVE-2015-8869 ocaml
CVE-2015-8869
2017-04-01 19:09
2017-01-05 20:14

Description


An update for ocaml is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

OCaml is a high-level, strongly-typed, functional, and object-oriented
programming language from the ML family of languages. The ocaml packages
contain two batch compilers (a fast bytecode compiler and an optimizing
native-code compiler), an interactive top level system, parsing tools
(Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and
a comprehensive library.

Security Fix(es):

* OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit
platforms, causes size arguments to internal memmove calls to be
sign-extended from 32- to 64-bits before being passed to the memmove
function. This leads to arguments between 2GiB and 4GiB being interpreted
as larger than they are (specifically, a bit below 2^64), causing a
buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted
as 4GiB smaller than they should be, causing a possible information
leak. (CVE-2015-8869)
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
7 ocaml ocaml-4.01.0-22.7.el7_2.src.rpm
ocaml ocaml-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-camlp4 ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-camlp4-devel ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-compiler-libs ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-docs ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-emacs ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-labltk ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-labltk-devel ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-ocamldoc ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-runtime ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-source ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm
ocaml-x11 ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm