mdpushblock_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
{ "binaries": [ { "binary_name": "libmd4c-dev", "binary_version": "0.4.8-1build1" }, { "binary_name": "libmd4c-html0", "binary_version": "0.4.8-1build1" }, { "binary_name": "libmd4c-html0-dev", "binary_version": "0.4.8-1build1" }, { "binary_name": "libmd4c0", "binary_version": "0.4.8-1build1" } ] }
{ "binaries": [ { "binary_name": "libmd4c-dev", "binary_version": "0.5.2-2" }, { "binary_name": "libmd4c-html0", "binary_version": "0.5.2-2" }, { "binary_name": "libmd4c-html0-dev", "binary_version": "0.5.2-2" }, { "binary_name": "libmd4c0", "binary_version": "0.5.2-2" }, { "binary_name": "md2html", "binary_version": "0.5.2-2" } ] }