{"id":"CVE-2026-28364","details":"In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.","aliases":["GHSA-j26j-m5xr-g23c","GHSA-m34r-cgq7-jhfm","OSEC-2026-01"],"modified":"2026-04-10T05:42:25.742610Z","published":"2026-02-27T04:16:03.410Z","related":["SUSE-SU-2026:0800-1","SUSE-SU-2026:0830-1","openSUSE-SU-2026:20368-1"],"references":[{"type":"ADVISORY","url":"https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json"},{"type":"ADVISORY","url":"https://osv.dev/vulnerability/OSEC-2026-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ocaml/ocaml","events":[{"introduced":"0"},{"fixed":"ce529ce4255a8a057357647fe385c03b0132fdbe"},{"introduced":"e86f9e5d41217e8c824455206e854072b803b170"},{"fixed":"152d7ca5dd2c67ecfece73f91aea5697f95178a5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.14.3"},{"introduced":"5.0.0"},{"fixed":"5.4.1"}]}}],"versions":["4.14.0","4.14.0-alpha1","4.14.0-alpha2","4.14.0-beta1","4.14.0-rc1","4.14.0-rc2","4.14.1","4.14.1-rc1","4.14.2","4.14.2-rc1","5.4.0","5.4.0-alpha1","5.4.0-beta1","5.4.0-beta2","5.4.0-rc1","flambda_fork_point"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-28364.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}