5.3
CVSSv3

CVE-2023-22485

Published: 24/01/2023 Updated: 02/02/2023
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9

Vulnerability Summary

cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior 0.29.0.gfm.7, a crafted markdown document can trigger an out-of-bounds read in the `validate_protocol` function. We believe this bug is harmless in practice, because the out-of-bounds read accesses `malloc` metadata without causing any visible damage.This vulnerability has been patched in 0.29.0.gfm.7.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

github cmark-gfm

Vendor Advisories

Debian Bug report logs - #1033110 cmark-gfm: CVE-2023-22483 CVE-2023-22484 CVE-2023-22485 CVE-2023-22486 Package: src:cmark-gfm; Maintainer for src:cmark-gfm is Keith Packard <keithp@keithpcom>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 17 Mar 2023 13:54:04 UTC Severity: important Tags: security, u ...

Github Repositories

CVE-2023-22485 cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C In versions prior 0290gfm7, a crafted markdown document can trigger an out-of-bounds read in the validate_protocol function We believe this bug is harmless in practice, because the out-of-bounds read accesses malloc metadata without causing any visible dama