[Bug 223039] lang/ocaml: generating insecure code before 4.03

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Sun Oct 15 23:23:38 UTC 2017


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=223039

            Bug ID: 223039
           Summary: lang/ocaml: generating insecure code before 4.03
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs at FreeBSD.org
          Reporter: freebsd at phil.spodhuis.org
                CC: michipili at gmail.com
             Flags: maintainer-feedback?(michipili at gmail.com)
                CC: michipili at gmail.com

This should be tracked as a security problem; per:

  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869

the OCaml compiler before version 4.03 generates insecure code, mis-handling
sign extensions resulting in remote code execution vulnerabilities in software
written in OCaml, if it accepts network connections.

Example network-connection-accepting OCaml software in Ports:  security/sks

The current packaging is 4.02.3, not 4.03+, thus all OCaml code being compiled
on FreeBSD using the compiler in Ports should be considered vulnerable, per my
understanding of the CVE.

There is work in progress for one possible path forward in bug 218333; whether
this security-issue bug ends up marked as a dup or prompts shorter-term fast
work to update the compiler, is a matter for the Security & Ports folks of
FreeBSD to decide, but I felt it worth having a tracking bug for the security
implications rather than one possible remediation path.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list