Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1332090 - (CVE-2015-8869) CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits
CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160428,repor...
: Security
Depends On: 1332091 1343081 1343082 1343100 1343101 1343103 1344243
Blocks: 1332092
  Show dependency treegraph
 
Reported: 2016-05-02 04:08 EDT by Andrej Nemec
Modified: 2017-03-21 05:02 EDT (History)
4 users (show)

See Also:
Fixed In Version: ocaml 4.03.0
Doc Type: Bug Fix
Doc Text:
An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-03-21 05:02:05 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1296 normal SHIPPED_LIVE Moderate: ocaml security update 2016-06-23 15:43:55 EDT
Red Hat Product Errata RHSA-2016:2576 normal SHIPPED_LIVE Moderate: libguestfs and virt-p2v security, bug fix, and enhancement update 2016-11-03 08:06:51 EDT
Red Hat Product Errata RHSA-2017:0564 normal SHIPPED_LIVE Moderate: libguestfs security and bug fix update 2017-03-21 08:21:18 EDT
Red Hat Product Errata RHSA-2017:0565 normal SHIPPED_LIVE Moderate: ocaml security update 2017-03-21 08:21:41 EDT

  None (edit)
Description Andrej Nemec 2016-05-02 04:08:50 EDT
OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes sizes arguments to an internal memmove call to be sign-extended from 32 to 64-bits before being passed to the memmove function.

This leads arguments between 2GiB and 4GiB to be interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow.

Arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak.

References:

http://seclists.org/oss-sec/2016/q2/165

Upstream fix:

https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762
Comment 1 Andrej Nemec 2016-05-02 04:09:08 EDT
Created ocaml tracking bugs for this issue:

Affects: fedora-all [bug 1332091]
Comment 3 Fedora Update System 2016-05-08 20:04:00 EDT
ocaml-4.02.3-3.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
Comment 4 Fedora Update System 2016-05-15 01:31:11 EDT
ocaml-4.02.2-5.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Comment 10 errata-xmlrpc 2016-06-23 11:44:14 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:1296 https://access.redhat.com/errata/RHSA-2016:1296
Comment 11 errata-xmlrpc 2016-11-03 14:00:10 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2576 https://rhn.redhat.com/errata/RHSA-2016-2576.html
Comment 13 errata-xmlrpc 2017-03-21 04:56:00 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:0564 https://rhn.redhat.com/errata/RHSA-2017-0564.html
Comment 14 errata-xmlrpc 2017-03-21 04:56:35 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:0565 https://rhn.redhat.com/errata/RHSA-2017-0565.html

Note You need to log in before you can comment on or make changes to this bug.