vulnerability

Oracle Linux: CVE-2015-8869: ELSA-2016-1296: ocaml security update (MODERATE) (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:C)
Published
Jun 13, 2016
Added
Jun 23, 2016
Modified
Dec 6, 2024

Description

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

Solutions

oracle-linux-upgrade-libguestfsoracle-linux-upgrade-libguestfs-bash-completionoracle-linux-upgrade-libguestfs-develoracle-linux-upgrade-libguestfs-gfs2oracle-linux-upgrade-libguestfs-gobjectoracle-linux-upgrade-libguestfs-gobject-develoracle-linux-upgrade-libguestfs-gobject-docoracle-linux-upgrade-libguestfs-inspect-iconsoracle-linux-upgrade-libguestfs-javaoracle-linux-upgrade-libguestfs-java-develoracle-linux-upgrade-libguestfs-javadocoracle-linux-upgrade-libguestfs-man-pages-jaoracle-linux-upgrade-libguestfs-man-pages-ukoracle-linux-upgrade-libguestfs-rescueoracle-linux-upgrade-libguestfs-rsyncoracle-linux-upgrade-libguestfs-toolsoracle-linux-upgrade-libguestfs-tools-coracle-linux-upgrade-libguestfs-xfsoracle-linux-upgrade-lua-guestfsoracle-linux-upgrade-ocamloracle-linux-upgrade-ocaml-camlp4oracle-linux-upgrade-ocaml-camlp4-develoracle-linux-upgrade-ocaml-compiler-libsoracle-linux-upgrade-ocaml-docsoracle-linux-upgrade-ocaml-emacsoracle-linux-upgrade-ocaml-labltkoracle-linux-upgrade-ocaml-labltk-develoracle-linux-upgrade-ocaml-libguestfsoracle-linux-upgrade-ocaml-libguestfs-develoracle-linux-upgrade-ocaml-ocamldocoracle-linux-upgrade-ocaml-runtimeoracle-linux-upgrade-ocaml-sourceoracle-linux-upgrade-ocaml-x11oracle-linux-upgrade-perl-sys-guestfsoracle-linux-upgrade-python-libguestfsoracle-linux-upgrade-ruby-libguestfsoracle-linux-upgrade-virt-diboracle-linux-upgrade-virt-v2v
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.