CVE-2023-22485
24.01.2023, 01:15
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior 0.29.0.gfm.7, a crafted markdown document can trigger an out-of-bounds read in the `validate_protocol` function. We believe this bug is harmless in practice, because the out-of-bounds read accesses `malloc` metadata without causing any visible damage.This vulnerability has been patched in 0.29.0.gfm.7.
Vendor | Product | Version |
---|---|---|
github | cmark-gfm | 𝑥 < 0.29.0.gfm.7 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
cmark-gfm |
| ||||||||||
python-cmarkgfm |
| ||||||||||
r-cran-commonmark |
| ||||||||||
ruby-commonmarker |
|

Ubuntu Releases
Common Weakness Enumeration
- CWE-125 - Out-of-bounds ReadThe software reads data past the end, or before the beginning, of the intended buffer.
- CWE-91 - XML Injection (aka Blind XPath Injection)The software does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.