Описание
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | DNE | |
| devel | not-affected | 0.5.2-2 |
| esm-apps/focal | needed | |
| esm-apps/jammy | not-affected | 0.4.8-1 |
| esm-apps/noble | not-affected | 0.4.8-1build1 |
| esm-infra-legacy/trusty | DNE | |
| focal | ignored | end of standard support, was needs-triage |
| groovy | ignored | end of life |
| hirsute | ignored | end of life |
| impish | ignored | end of life |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigge ...
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
5 Medium
CVSS2
7.5 High
CVSS3