ID CVE-2015-8869
Summary OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
References
Vulnerable Configurations
  • Fedora 24
    cpe:2.3:o:fedoraproject:fedora:24
  • Novell openSUSE 13.2
    cpe:2.3:o:novell:opensuse:13.2
  • Ocaml 4.02.3
    cpe:2.3:a:ocaml:ocaml:4.02.3
CVSS
Base: 6.4 (as of 08-07-2016 - 11:38)
Impact:
Exploitability:
CWE CWE-200
CAPEC
  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.
  • Reusing Session IDs (aka Session Replay)
    This attack targets the reuse of valid session ID to spoof the target system in order to gain privileges. The attacker tries to reuse a stolen session ID used previously during a transaction to perform spoofing and session hijacking. Another name for this type of attack is Session Replay.
  • Using Slashes in Alternate Encoding
    This attack targets the encoding of the Slash characters. An attacker would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the attacker many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE PARTIAL
nessus via4
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170321_OCAML_ON_SL6_X.NASL
    description Security Fix(es) : - An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869)
    last seen 2018-09-01
    modified 2017-04-06
    plugin id 99220
    published 2017-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99220
    title Scientific Linux Security Update : ocaml on SL6.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-0565.NASL
    description From Red Hat Security Advisory 2017:0565 : An update for ocaml is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
    last seen 2018-09-01
    modified 2018-07-25
    plugin id 99062
    published 2017-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99062
    title Oracle Linux 6 : ocaml (ELSA-2017-0565)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-0565.NASL
    description An update for ocaml is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
    last seen 2018-09-01
    modified 2018-07-03
    plugin id 97950
    published 2017-03-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97950
    title CentOS 6 : ocaml (CESA-2017:0565)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3437-1.NASL
    description Radek Micek discovered that OCaml incorrectly handled sign extensions. A remote attacker could use this issue to cause applications using OCaml to crash, to possibly obtain sensitive information, or to possibly execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-08-07
    plugin id 103662
    published 2017-10-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=103662
    title Ubuntu 14.04 LTS : ocaml vulnerability (USN-3437-1)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2016-1296.NASL
    description An update for ocaml is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es) : * OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign-extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869)
    last seen 2018-09-02
    modified 2018-07-03
    plugin id 91788
    published 2016-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91788
    title CentOS 7 : ocaml (CESA-2016:1296)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2016-1C4E616564.NASL
    description Security fix for CVE-2015-8869 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2016-10-18
    plugin id 90950
    published 2016-05-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=90950
    title Fedora 24 : ocaml-4.02.3-3.fc24 (2016-1c4e616564)
  • NASL family Huawei Local Security Checks
    NASL id EULEROS_SA-2017-1061.NASL
    description According to the version of the libguestfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.(CVE-2015-8869) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-08-10
    plugin id 99908
    published 2017-05-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99908
    title EulerOS 2.0 SP2 : libguestfs (EulerOS-SA-2017-1061)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2016-1072.NASL
    description This update for ocaml fixes the following issue : Security issue fixed : - CVE-2015-8869: Prevent buffer overflow and information leak. (bsc#977990) This update was imported from the SUSE:SLE-12:Update update project.
    last seen 2018-09-01
    modified 2016-10-13
    plugin id 93435
    published 2016-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93435
    title openSUSE Security Update : ocaml (openSUSE-2016-1072)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20161103_LIBGUESTFS_AND_VIRT_P2V_ON_SL7_X.NASL
    description Virt-p2v is a tool for conversion of a physical server to a virtual guest. The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). Security Fix(es) : - An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes :
    last seen 2018-09-01
    modified 2016-12-15
    plugin id 95843
    published 2016-12-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=95843
    title Scientific Linux Security Update : libguestfs and virt-p2v on SL7.x x86_64
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20160623_OCAML_ON_SL7_X.NASL
    description Security Fix(es) : - OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign- extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869)
    last seen 2018-09-01
    modified 2016-10-19
    plugin id 92031
    published 2016-07-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=92031
    title Scientific Linux Security Update : ocaml on SL7.x x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2016-1296.NASL
    description From Red Hat Security Advisory 2016:1296 : An update for ocaml is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es) : * OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign-extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869)
    last seen 2018-09-01
    modified 2018-07-25
    plugin id 91799
    published 2016-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91799
    title Oracle Linux 7 : ocaml (ELSA-2016-1296)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2016-2576.NASL
    description An update for libguestfs and virt-p2v is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Virt-p2v is a tool for conversion of a physical server to a virtual guest. The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). (BZ#1218766) Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
    last seen 2018-09-01
    modified 2018-07-03
    plugin id 95323
    published 2016-11-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=95323
    title CentOS 7 : libguestfs (CESA-2016:2576)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20170321_LIBGUESTFS_ON_SL6_X.NASL
    description Security Fix(es) : - An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue.
    last seen 2018-09-01
    modified 2017-04-06
    plugin id 99219
    published 2017-04-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99219
    title Scientific Linux Security Update : libguestfs on SL6.x x86_64
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-466.NASL
    description OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes sizes arguments to an internal memmove call to be sign-extended from 32 to 64-bits before being passed to the memmove function. This leads arguments between 2GiB and 4GiB to be interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak.A NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2018-07-09
    plugin id 91051
    published 2016-05-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91051
    title Debian DLA-466-1 : ocaml security update
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-2576.NASL
    description An update for libguestfs and virt-p2v is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Virt-p2v is a tool for conversion of a physical server to a virtual guest. The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). (BZ#1218766) Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
    last seen 2018-10-18
    modified 2018-10-17
    plugin id 94539
    published 2016-11-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94539
    title RHEL 7 : libguestfs and virt-p2v (RHSA-2016:2576)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2016-1296.NASL
    description An update for ocaml is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es) : * OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign-extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869)
    last seen 2018-10-18
    modified 2018-10-17
    plugin id 91804
    published 2016-06-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91804
    title RHEL 7 : ocaml (RHSA-2016:1296)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201702-15.NASL
    description The remote host is affected by the vulnerability described in GLSA-201702-15 (OCaml: Buffer overflow and information disclosure) It was discovered that OCaml was vulnerable to a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign-extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be causing a possible information leak. Impact : A remote attacker, able to interact with an OCaml-based application, could possibly obtain sensitive information or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2018-09-02
    modified 2017-02-21
    plugin id 97258
    published 2017-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97258
    title GLSA-201702-15 : OCaml: Buffer overflow and information disclosure
  • NASL family OracleVM Local Security Checks
    NASL id ORACLEVM_OVMSA-2017-0049.NASL
    description The remote OracleVM system is missing necessary patches to address critical security updates : - Enable execshield stack protection on ppc/ppc64 (572826) related: rhbz#1343082 - Fix strict-aliasing warnings in build (990540). - Fix buffer overflow and information leak (CVE-2015-8869) resolves: rhbz#1343082
    last seen 2018-09-02
    modified 2018-07-25
    plugin id 99076
    published 2017-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99076
    title OracleVM 3.3 / 3.4 : ocaml (OVMSA-2017-0049)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2017-0564.NASL
    description From Red Hat Security Advisory 2017:0564 : An update for libguestfs is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
    last seen 2018-09-01
    modified 2018-07-25
    plugin id 99061
    published 2017-03-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=99061
    title Oracle Linux 6 : libguestfs (ELSA-2017-0564)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2016-78AD11154F.NASL
    description Security fix for CVE-2015-8869 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2018-09-01
    modified 2016-10-18
    plugin id 92114
    published 2016-07-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=92114
    title Fedora 23 : ocaml (2016-78ad11154f)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2017-0564.NASL
    description An update for libguestfs is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
    last seen 2018-09-01
    modified 2018-07-03
    plugin id 97949
    published 2017-03-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97949
    title CentOS 6 : libguestfs (CESA-2017:0564)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2016-2576.NASL
    description From Red Hat Security Advisory 2016:2576 : An update for libguestfs and virt-p2v is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Virt-p2v is a tool for conversion of a physical server to a virtual guest. The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). (BZ#1218766) Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
    last seen 2018-09-02
    modified 2018-07-25
    plugin id 94699
    published 2016-11-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=94699
    title Oracle Linux 7 : libguestfs (ELSA-2016-2576)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2016-605.NASL
    description This update for ocaml fixes the following issues : Security issue fixed : - CVE-2015-8869: prevent buffer overflow and information leak (boo#977990)
    last seen 2018-09-01
    modified 2016-10-13
    plugin id 91275
    published 2016-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=91275
    title openSUSE Security Update : ocaml (openSUSE-2016-605)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-0565.NASL
    description An update for ocaml is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages. The ocaml packages contain two batch compilers (a fast bytecode compiler and an optimizing native-code compiler), an interactive top level system, parsing tools (Lex, Yacc, Camlp4), a replay debugger, a documentation generator, and a comprehensive library. Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 97873
    published 2017-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97873
    title RHEL 6 : ocaml (RHSA-2017:0565)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2017-0564.NASL
    description An update for libguestfs is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The libguestfs packages contain a library, which is used for accessing and modifying virtual machine (VM) disk images. Security Fix(es) : * An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. Additional Changes : For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 97872
    published 2017-03-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=97872
    title RHEL 6 : libguestfs (RHSA-2017:0564)
redhat via4
advisories
  • bugzilla
    id 1332090
    title CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    • OR
      • AND
        • comment ocaml is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296025
        • comment ocaml is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296026
      • AND
        • comment ocaml-camlp4 is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296011
        • comment ocaml-camlp4 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296012
      • AND
        • comment ocaml-camlp4-devel is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296007
        • comment ocaml-camlp4-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296008
      • AND
        • comment ocaml-compiler-libs is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296015
        • comment ocaml-compiler-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296016
      • AND
        • comment ocaml-docs is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296019
        • comment ocaml-docs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296020
      • AND
        • comment ocaml-emacs is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296017
        • comment ocaml-emacs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296018
      • AND
        • comment ocaml-labltk is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296005
        • comment ocaml-labltk is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296006
      • AND
        • comment ocaml-labltk-devel is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296009
        • comment ocaml-labltk-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296010
      • AND
        • comment ocaml-ocamldoc is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296021
        • comment ocaml-ocamldoc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296022
      • AND
        • comment ocaml-runtime is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296013
        • comment ocaml-runtime is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296014
      • AND
        • comment ocaml-source is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296023
        • comment ocaml-source is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296024
      • AND
        • comment ocaml-x11 is earlier than 0:4.01.0-22.7.el7_2
          oval oval:com.redhat.rhsa:tst:20161296027
        • comment ocaml-x11 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296028
    rhsa
    id RHSA-2016:1296
    released 2016-06-23
    severity Moderate
    title RHSA-2016:1296: ocaml security update (Moderate)
  • bugzilla
    id 1370424
    title virt-manager coredump when vm with gluster image exists
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhsa:tst:20140675001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhsa:tst:20140675002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20140675003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20140675004
    • OR
      • AND
        • comment virt-p2v is earlier than 0:1.32.7-2.el7
          oval oval:com.redhat.rhsa:tst:20162576005
        • comment virt-p2v is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576006
      • AND
        • comment libguestfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576039
        • comment libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586006
      • AND
        • comment libguestfs-bash-completion is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576051
        • comment libguestfs-bash-completion is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576052
      • AND
        • comment libguestfs-devel is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576037
        • comment libguestfs-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586008
      • AND
        • comment libguestfs-gfs2 is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576043
        • comment libguestfs-gfs2 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576044
      • AND
        • comment libguestfs-gobject is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576009
        • comment libguestfs-gobject is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576010
      • AND
        • comment libguestfs-gobject-devel is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576007
        • comment libguestfs-gobject-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576008
      • AND
        • comment libguestfs-gobject-doc is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576055
        • comment libguestfs-gobject-doc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576056
      • AND
        • comment libguestfs-inspect-icons is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576049
        • comment libguestfs-inspect-icons is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576050
      • AND
        • comment libguestfs-java is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576015
        • comment libguestfs-java is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586018
      • AND
        • comment libguestfs-java-devel is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576013
        • comment libguestfs-java-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586028
      • AND
        • comment libguestfs-javadoc is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576045
        • comment libguestfs-javadoc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586012
      • AND
        • comment libguestfs-man-pages-ja is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576057
        • comment libguestfs-man-pages-ja is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576058
      • AND
        • comment libguestfs-man-pages-uk is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576053
        • comment libguestfs-man-pages-uk is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576054
      • AND
        • comment libguestfs-rescue is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576035
        • comment libguestfs-rescue is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576036
      • AND
        • comment libguestfs-rsync is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576033
        • comment libguestfs-rsync is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576034
      • AND
        • comment libguestfs-tools is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576047
        • comment libguestfs-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586010
      • AND
        • comment libguestfs-tools-c is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576029
        • comment libguestfs-tools-c is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586020
      • AND
        • comment libguestfs-xfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576031
        • comment libguestfs-xfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576032
      • AND
        • comment lua-guestfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576011
        • comment lua-guestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576012
      • AND
        • comment ocaml-libguestfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576025
        • comment ocaml-libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586014
      • AND
        • comment ocaml-libguestfs-devel is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576023
        • comment ocaml-libguestfs-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586030
      • AND
        • comment perl-Sys-Guestfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576021
        • comment perl-Sys-Guestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586024
      • AND
        • comment python-libguestfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576019
        • comment python-libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586016
      • AND
        • comment ruby-libguestfs is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576017
        • comment ruby-libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586032
      • AND
        • comment virt-dib is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576027
        • comment virt-dib is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20162576028
      • AND
        • comment virt-v2v is earlier than 1:1.32.7-3.el7
          oval oval:com.redhat.rhsa:tst:20162576041
        • comment virt-v2v is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111615006
    rhsa
    id RHSA-2016:2576
    released 2016-11-03
    severity Moderate
    title RHSA-2016:2576: libguestfs and virt-p2v security, bug fix, and enhancement update (Moderate)
  • bugzilla
    id 1388407
    title via fstab
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment libguestfs is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564025
        • comment libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586006
      • AND
        • comment libguestfs-devel is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564017
        • comment libguestfs-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586008
      • AND
        • comment libguestfs-java is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564023
        • comment libguestfs-java is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586018
      • AND
        • comment libguestfs-java-devel is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564019
        • comment libguestfs-java-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586028
      • AND
        • comment libguestfs-javadoc is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564027
        • comment libguestfs-javadoc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586012
      • AND
        • comment libguestfs-tools is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564005
        • comment libguestfs-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586010
      • AND
        • comment libguestfs-tools-c is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564009
        • comment libguestfs-tools-c is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586020
      • AND
        • comment ocaml-libguestfs is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564007
        • comment ocaml-libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586014
      • AND
        • comment ocaml-libguestfs-devel is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564011
        • comment ocaml-libguestfs-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586030
      • AND
        • comment perl-Sys-Guestfs is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564015
        • comment perl-Sys-Guestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586024
      • AND
        • comment python-libguestfs is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564013
        • comment python-libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586016
      • AND
        • comment ruby-libguestfs is earlier than 1:1.20.11-20.el6
          oval oval:com.redhat.rhsa:tst:20170564021
        • comment ruby-libguestfs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110586032
    rhsa
    id RHSA-2017:0564
    released 2017-03-21
    severity Moderate
    title RHSA-2017:0564: libguestfs security and bug fix update (Moderate)
  • bugzilla
    id 1332090
    title CVE-2015-8869 ocaml: sizes arguments are sign-extended from 32 to 64 bits
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment ocaml is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565019
        • comment ocaml is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296026
      • AND
        • comment ocaml-camlp4 is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565023
        • comment ocaml-camlp4 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296012
      • AND
        • comment ocaml-camlp4-devel is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565009
        • comment ocaml-camlp4-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296008
      • AND
        • comment ocaml-docs is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565021
        • comment ocaml-docs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296020
      • AND
        • comment ocaml-emacs is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565015
        • comment ocaml-emacs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296018
      • AND
        • comment ocaml-labltk is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565007
        • comment ocaml-labltk is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296006
      • AND
        • comment ocaml-labltk-devel is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565025
        • comment ocaml-labltk-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296010
      • AND
        • comment ocaml-ocamldoc is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565017
        • comment ocaml-ocamldoc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296022
      • AND
        • comment ocaml-runtime is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565013
        • comment ocaml-runtime is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296014
      • AND
        • comment ocaml-source is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565011
        • comment ocaml-source is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296024
      • AND
        • comment ocaml-x11 is earlier than 0:3.11.2-5.el6
          oval oval:com.redhat.rhsa:tst:20170565005
        • comment ocaml-x11 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20161296028
    rhsa
    id RHSA-2017:0565
    released 2017-03-21
    severity Moderate
    title RHSA-2017:0565: ocaml security update (Moderate)
rpms
  • ocaml-0:4.01.0-22.7.el7_2
  • ocaml-camlp4-0:4.01.0-22.7.el7_2
  • ocaml-camlp4-devel-0:4.01.0-22.7.el7_2
  • ocaml-compiler-libs-0:4.01.0-22.7.el7_2
  • ocaml-docs-0:4.01.0-22.7.el7_2
  • ocaml-emacs-0:4.01.0-22.7.el7_2
  • ocaml-labltk-0:4.01.0-22.7.el7_2
  • ocaml-labltk-devel-0:4.01.0-22.7.el7_2
  • ocaml-ocamldoc-0:4.01.0-22.7.el7_2
  • ocaml-runtime-0:4.01.0-22.7.el7_2
  • ocaml-source-0:4.01.0-22.7.el7_2
  • ocaml-x11-0:4.01.0-22.7.el7_2
  • virt-p2v-0:1.32.7-2.el7
  • libguestfs-1:1.32.7-3.el7
  • libguestfs-bash-completion-1:1.32.7-3.el7
  • libguestfs-devel-1:1.32.7-3.el7
  • libguestfs-gfs2-1:1.32.7-3.el7
  • libguestfs-gobject-1:1.32.7-3.el7
  • libguestfs-gobject-devel-1:1.32.7-3.el7
  • libguestfs-gobject-doc-1:1.32.7-3.el7
  • libguestfs-inspect-icons-1:1.32.7-3.el7
  • libguestfs-java-1:1.32.7-3.el7
  • libguestfs-java-devel-1:1.32.7-3.el7
  • libguestfs-javadoc-1:1.32.7-3.el7
  • libguestfs-man-pages-ja-1:1.32.7-3.el7
  • libguestfs-man-pages-uk-1:1.32.7-3.el7
  • libguestfs-rescue-1:1.32.7-3.el7
  • libguestfs-rsync-1:1.32.7-3.el7
  • libguestfs-tools-1:1.32.7-3.el7
  • libguestfs-tools-c-1:1.32.7-3.el7
  • libguestfs-xfs-1:1.32.7-3.el7
  • lua-guestfs-1:1.32.7-3.el7
  • ocaml-libguestfs-1:1.32.7-3.el7
  • ocaml-libguestfs-devel-1:1.32.7-3.el7
  • perl-Sys-Guestfs-1:1.32.7-3.el7
  • python-libguestfs-1:1.32.7-3.el7
  • ruby-libguestfs-1:1.32.7-3.el7
  • virt-dib-1:1.32.7-3.el7
  • virt-v2v-1:1.32.7-3.el7
  • libguestfs-1:1.20.11-20.el6
  • libguestfs-devel-1:1.20.11-20.el6
  • libguestfs-java-1:1.20.11-20.el6
  • libguestfs-java-devel-1:1.20.11-20.el6
  • libguestfs-javadoc-1:1.20.11-20.el6
  • libguestfs-tools-1:1.20.11-20.el6
  • libguestfs-tools-c-1:1.20.11-20.el6
  • ocaml-libguestfs-1:1.20.11-20.el6
  • ocaml-libguestfs-devel-1:1.20.11-20.el6
  • perl-Sys-Guestfs-1:1.20.11-20.el6
  • python-libguestfs-1:1.20.11-20.el6
  • ruby-libguestfs-1:1.20.11-20.el6
  • ocaml-0:3.11.2-5.el6
  • ocaml-camlp4-0:3.11.2-5.el6
  • ocaml-camlp4-devel-0:3.11.2-5.el6
  • ocaml-docs-0:3.11.2-5.el6
  • ocaml-emacs-0:3.11.2-5.el6
  • ocaml-labltk-0:3.11.2-5.el6
  • ocaml-labltk-devel-0:3.11.2-5.el6
  • ocaml-ocamldoc-0:3.11.2-5.el6
  • ocaml-runtime-0:3.11.2-5.el6
  • ocaml-source-0:3.11.2-5.el6
  • ocaml-x11-0:3.11.2-5.el6
refmap via4
bid 89318
confirm
fedora FEDORA-2016-1c4e616564
gentoo GLSA-201702-15
mlist
  • [oss-security] 20160429 Re: buffer overflow and information leak in OCaml < 4.03.0
  • [oss-security] 20160429 buffer overflow and information leak in OCaml < 4.03.0
suse
  • openSUSE-SU-2016:1335
  • openSUSE-SU-2016:2273
Last major update 28-11-2016 - 14:50
Published 13-06-2016 - 15:59
Last modified 04-01-2018 - 21:30
Back to Top