Duplicate Advisory: Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
High severity
GitHub Reviewed
Published
Jan 4, 2024
to the GitHub Advisory Database
•
Updated Jan 5, 2024
Withdrawn
This advisory was withdrawn on Jan 5, 2024
Description
Published by the National Vulnerability Database
Jan 4, 2024
Published to the GitHub Advisory Database
Jan 4, 2024
Reviewed
Jan 5, 2024
Withdrawn
Jan 5, 2024
Last updated
Jan 5, 2024
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-fmx4-26r3-wxpf. This link is maintained to preserve external references.
Original Description
CommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns.
References