DEBIAN-CVE-2024-22051

Source
https://security-tracker.debian.org/tracker/CVE-2024-22051
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-22051.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-22051
Upstream
Published
2024-01-04T21:15:10Z
Modified
2025-09-19T06:16:41Z
Summary
[none]
Details

CommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns.

References

Affected packages

Debian:12 / ruby-commonmarker

Package

Name
ruby-commonmarker
Purl
pkg:deb/debian/ruby-commonmarker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ruby-commonmarker

Package

Name
ruby-commonmarker
Purl
pkg:deb/debian/ruby-commonmarker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / ruby-commonmarker

Package

Name
ruby-commonmarker
Purl
pkg:deb/debian/ruby-commonmarker?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}