mdpushblock_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
{
"binaries": [
{
"binary_version": "0.4.8-1build1",
"binary_name": "libmd4c-dev"
},
{
"binary_version": "0.4.8-1build1",
"binary_name": "libmd4c-html0"
},
{
"binary_version": "0.4.8-1build1",
"binary_name": "libmd4c-html0-dev"
},
{
"binary_version": "0.4.8-1build1",
"binary_name": "libmd4c0"
}
]
}
{
"binaries": [
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c-dev"
},
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c-html0"
},
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c-html0-dev"
},
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c0"
},
{
"binary_version": "0.5.2-2",
"binary_name": "md2html"
}
]
}
{
"binaries": [
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c-dev"
},
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c-html0"
},
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c-html0-dev"
},
{
"binary_version": "0.5.2-2",
"binary_name": "libmd4c0"
},
{
"binary_version": "0.5.2-2",
"binary_name": "md2html"
}
]
}