CVE-2015-8869

Priority
Medium
Description
OCaml before 4.03.0 does not properly handle sign extensions, which allows
remote attackers to conduct buffer overflow attacks or obtain sensitive
information as demonstrated by a long string to the String.copy function.
References
Bugs
Assigned-to
mdeslaur
Package
Source: ocaml (LP Ubuntu Debian)
Upstream:released (4.03.0)
Ubuntu 17.10 (Artful Aardvark):needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):released (4.01.0-3ubuntu3.1)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 17.04 (Zesty Zapus):needed
Patches:
Upstream:https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74
More Information

Updated: 2017-10-03 20:14:14 UTC (commit 13452)