Описание
ELSA-2017-0565: ocaml security update (MODERATE)
[3.11.2-5]
- Enable execshield stack protection on ppc/ppc64 (572826) related: rhbz#1343082
- Fix strict-aliasing warnings in build (990540).
[3.11.2-3]
- Fix buffer overflow and information leak CVE-2015-8869 resolves: rhbz#1343082
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
ocaml
3.11.2-5.el6
ocaml-camlp4
3.11.2-5.el6
ocaml-camlp4-devel
3.11.2-5.el6
ocaml-docs
3.11.2-5.el6
ocaml-emacs
3.11.2-5.el6
ocaml-labltk
3.11.2-5.el6
ocaml-labltk-devel
3.11.2-5.el6
ocaml-ocamldoc
3.11.2-5.el6
ocaml-runtime
3.11.2-5.el6
ocaml-source
3.11.2-5.el6
ocaml-x11
3.11.2-5.el6
Oracle Linux i686
ocaml
3.11.2-5.el6
ocaml-camlp4
3.11.2-5.el6
ocaml-camlp4-devel
3.11.2-5.el6
ocaml-docs
3.11.2-5.el6
ocaml-emacs
3.11.2-5.el6
ocaml-labltk
3.11.2-5.el6
ocaml-labltk-devel
3.11.2-5.el6
ocaml-ocamldoc
3.11.2-5.el6
ocaml-runtime
3.11.2-5.el6
ocaml-source
3.11.2-5.el6
ocaml-x11
3.11.2-5.el6
Связанные CVE
Связанные уязвимости
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
OCaml before 4.03.0 does not properly handle sign extensions, which al ...