{"id":"CVE-2026-28364","details":"In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.","aliases":["GHSA-j26j-m5xr-g23c","GHSA-m34r-cgq7-jhfm","OSEC-2026-01"],"modified":"2026-05-15T04:14:32.052733491Z","published":"2026-02-27T03:54:53.458Z","related":["SUSE-SU-2026:0800-1","SUSE-SU-2026:0830-1","openSUSE-SU-2026:20368-1"],"database_specific":{"cna_assigner":"mitre","unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"fixed":"4.14.3"},{"introduced":"5.0.0"},{"fixed":"5.4.1"}]},{"source":"CPE_FIELD","extracted_events":[{"fixed":"4.14.3"},{"introduced":"5.0.0"},{"fixed":"5.4.1"}]},{"source":"DESCRIPTION","extracted_events":[{"fixed":"4.14.3"},{"introduced":"5.x"},{"fixed":"5.4.1"}]}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28364.json","cwe_ids":["CWE-126"]},"references":[{"type":"WEB","url":"https://osv.dev/vulnerability/OSEC-2026-01"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/28xxx/CVE-2026-28364.json"},{"type":"ADVISORY","url":"https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28364"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N"}]}