Source: discount
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for discount.

CVE-2026-35201[0]:
| Discount is an implementation of John Gruber's Markdown markup
| language in C. From 1.3.1.1 to before 2.2.7.4, a signed length
| truncation bug causes an out-of-bounds read in the default Markdown
| parse path. Inputs larger than INT_MAX are truncated to a signed int
| before entering the native parser, allowing the parser to read past
| the end of the supplied buffer and crash the process. This
| vulnerability is fixed in 2.2.7.4.

https://github.com/davidfstr/rdiscount/security/advisories/GHSA-6r34-94wq-jhrc
https://github.com/davidfstr/rdiscount/commit/b1a16445e92e0d12c07594dedcdc56f80b317761
 (2.2.7.4)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-35201
    https://www.cve.org/CVERecord?id=CVE-2026-35201

Please adjust the affected versions in the BTS as needed.

Reply via email to