A vulnerability in OCaml may allow local users to gain root privileges.
Package | dev-lang/ocaml on all architectures |
---|---|
Affected versions | < 4.04.2 |
Unaffected versions | >= 4.04.2 |
OCaml is a high-level, strongly-typed, functional, and object-oriented programming language from the ML family of languages.
A bad sanitization of environment variables: CAML_CPLUGINS, CAML_NATIVE_CPLUGINS and CAML_BYTE_CPLUGINS in the OCaml compiler allows the execution of raised privileges via external code.
A local attacker, by using specially crafted environment variables, could possibly escalate privileges to the root group.
There is no known workaround at this time.
All OCaml users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ocaml-4.04.2"
Release date
October 08, 2017
Latest revision
October 08, 2017: 1
Severity
high
Exploitable
remote
Bugzilla entries