CVE-2022-24724

Source
https://cve.org/CVERecord?id=CVE-2022-24724
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24724.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-24724
Aliases
  • GHSA-mc3g-88wq-6f4x
Downstream
Related
Published
2022-03-03T19:35:09Z
Modified
2026-04-26T04:08:51.371532Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Integer overflow in table parsing extension leads to heap memory corruption
Details

cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing table.c:row_from_string may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where cmark-gfm is used. If cmark-gfm is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the cmark-gfm library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.

Database specific
{
    "cwe_ids": [
        "CWE-190"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24724.json"
}
References

Affected packages

Git / github.com/github/cmark-gfm

Affected ranges

Type
GIT
Repo
https://github.com/github/cmark-gfm
Events

Affected versions

0.*
0.29.0.gfm.0
0.29.0.gfm.1
0.29.0.gfm.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24724.json"