OSEC-2026-01

See a problem?
Import Source
https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json
JSON Data
https://api.osv.dev/v1/vulns/OSEC-2026-01
Aliases
  • GHSA-j26j-m5xr-g23c
  • GHSA-m34r-cgq7-jhfm
Published
2026-02-17T13:30:00Z
Modified
2026-02-20T01:03:26.604192Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N CVSS Calculator
Summary
Buffer Over-Read in OCaml Marshal Deserialization
Details

Summary

A critical buffer over-read vulnerability in OCaml's Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from malicious Marshal data.

Please note that Marshal is not type safe, and you have to be careful if you use the deserialization on untrusted input (due to type confusion, and remote code execution by design - you can use Marshal for code).

Affected functions: Marshal.from_channel, Marshal.from_bytes, Marshal.from_string, Stdlib.input_value, Pervasives.input_value when reading data from an untrusted source.

Vulnerability Attack Vector

Corrupted or malicious marshaled data that causes undefined behaviour in the runtime system when unmarshaled. input_value should either fail cleanly or produce a well-formed OCaml object, without corrupting the runtime system.

Consequently, this excludes:

  • well-formed marshaled data that produces an OCaml object that is not of the type expected by the OCaml code and causes the Ocaml code to crash or misbehave

  • misuses of the OCaml runtime system by the program performing input_value, such as setting Debugger.function_placeholder to the wrong function.

The former issue may be addressed at some point by validating the unmarshaled OCaml value against the expected type, using the functions from module Obj and some kind of run-time type description.

The latter issue is a bug in the program that unmarshals the data.

Fix

OCaml runtime

The OCaml runtime has been hardened with additional bounds checks. An exception is raised on bad input.

Third party libraries

Third party libraries that want to harden their custom Marshal deserialization code can follow the example fix for bigarrays from the standard library. There are new macros in custom.h called Wsize_custom_data and Bsize_custom_data that return the size in words or bytes of the allocated custom destination block. The deserializer needs to ensure it only writes data within those bounds.

This only needs to be done if the library defines a custom type in a C binding, and struct custom_operations's deserialize field is not set to NULL or custom_deserialize_default, and struct custom_operations's fixed_length field is set to NULL or custom_fixed_length_default

Since Marshal.from* and input_value remain unsafe to use, the fix for the OCaml runtime is released, and we wouldn't attempt to coordinate updating all deserialization functions in the ecosystem.

Timeline

  • Nov 4th 2025: Discovery Date: Discovered first in OxCaml
  • Nov 5th 2025: First Disclosure Date (Jane Street Team): Emailed top maintainers, no response.
  • Nov 9th 2025: Second Disclosure Date (OCaml Team): Submitted to OCaml/ocaml GitHub Repo as a Security Advisory.
  • Nov 11th 2025: Emailed OCaml Security Mail List: Submitted to OCaml over email, responded asking for details.
  • Nov 11th 2025: Third Disclosure (OCaml Security Response Team): Submitted to ocaml/security-advisories GitHub Repo as a Security Advisory.
  • Dec 16th 2025: Initial patch is developed
  • Dec 17th 2025: Fuzz testing found further issues
  • Dec 24th 2025: Final patch for OCaml is developed
  • Dec 25th 2025: Fuzz testing couldn't find any further issues
  • Jan 2nd 2026: Patch got reviewed by OCaml maintainers
  • Jan 4th 2026: Benchmarking of the patch with good results
  • Jan 6th 2026: Reporter got contacted to confirm
  • Jan 25th 2026: Further related issues discovered by fuzzing
  • Feb 17th 2026: fixed OCaml releases are published, security advisory is published
Database specific
{
    "cwe": [
        "CWE-126",
        "CWE-502",
        "CWE-754"
    ],
    "osv": "https://github.com/ocaml/security-advisories/tree/generated-osv/2026/OSEC-2026-01.json",
    "human_link": "https://github.com/ocaml/security-advisories/tree/main/advisories/2026/OSEC-2026-01.md"
}
References
Credits
    • Justin Timperio - REPORTER
    • Nicolás Ojeda Bär - REMEDIATION_DEVELOPER
    • Xavier Leroy - REMEDIATION_DEVELOPER
    • Gabriel Scherer - REMEDIATION_DEVELOPER
    • Xavier Leroy - REMEDIATION_REVIEWER
    • Olivier Nicole - REMEDIATION_REVIEWER
    • Damien Doligez - REMEDIATION_REVIEWER
    • Gabriel Scherer - REMEDIATION_REVIEWER
    • Mindy Preston - REMEDIATION_VERIFIER
    • Edwin Török - REMEDIATION_VERIFIER
    • Hannes Mehnert - COORDINATOR

Affected packages

opam / ocaml

Package

Name
ocaml
Purl
pkg:opam/ocaml

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.3
Type
ECOSYSTEM
Events
Introduced
5
Fixed
5.4.1
Type
GIT
Repo
https://github.com/ocaml/ocaml
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/ocaml/ocaml
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/ocaml/ocaml
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/ocaml/ocaml
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*
3.07
3.07+1
3.07+2
3.08.0
3.08.1
3.08.2
3.08.3
3.08.4
3.09.0
3.09.1
3.09.2
3.09.3
3.10.0
3.10.1
3.10.2
3.11.0
3.11.1
3.11.2
3.12.0
3.12.1
4.*
4.00.0
4.00.1
4.01.0
4.02.0
4.02.1
4.02.2
4.02.3
4.02.4
4.03.0
4.03.1
4.04.0
4.04.1
4.04.2
4.04.3
4.05.0
4.05.1
4.06.0
4.06.1
4.06.2
4.07.0
4.07.1
4.07.2
4.08.0
4.08.1
4.08.2
4.09.0
4.09.1
4.09.2
4.10.0
4.10.1
4.10.2
4.10.3
4.11.0
4.11.1
4.11.2
4.11.3
4.12.0
4.12.1
4.12.2
4.13.0
4.13.1
4.13.2
4.14.0
4.14.1
4.14.2
5.*
5.0.0
5.0.1
5.1.0
5.1.1
5.1.2
5.2.0
5.2.1
5.2.2
5.3.0
5.3.1
5.4.0

Ecosystem specific

{
    "opam_constraint": "ocaml {< \"4.14.3\" | >= \"5\" & < \"5.4.1\"}"
}

Database specific

source
"https://github.com/ocaml/security-advisories/blob/generated-osv/2026/OSEC-2026-01.json"