[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] Re: CVE request: Stack overflow in redcarpet's header_anchor
From: cve-assign () mitre ! org
Date: 2015-06-30 16:13:21
Message-ID: 20150630161321.00B338BC074 () smtpvmsrv1 ! mitre ! org
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> https://github.com/vmg/redcarpet/commit/2cee777c1e5babe8a1e2683d31ea75cc4afe55fb
>
> https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md
>> Version 3.3.2
>> Fix a potential security issue in the HTML renderer (Thanks to Giancarlo Canales for the heads up)
> header_anchor uses variable length arrays (VLA) without any range checking.
>
> This is conducive to a stack overflow, followed by the potential for arbitrary code execution.
Use CVE-2015-5147.
- --
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)
iQEcBAEBAgAGBQJVkr+UAAoJEKllVAevmvmsKc4H/jUqANIqSni+uQgMUWROh0+5
csi/VXwpj+lGpXEBbzQkKlRgjRXJtVB47H2+cghcNL24Zgs/oW1ffNAqMxjqziOB
Rp9w76dhEecf+54lncJFvygM+ulvcbYw/cMIPHEzJ/mV+NS2/VVJrWcJqO8PcVug
isTP/ue2HToUf2JUQdbLuccjQBkfRRw7Hb2KJ2VquYM0edrQhQsGsilb4hYGpVRF
vxY8eVdrS7bObImNMK58EBGJJBBU9xm+fC9utbAnTYOCYtC6JxQr6XnJsm4s7rMH
VdQBpoz0dobQ+KewE18dTLZ6dXc88MQOZlaBJRXh5YNzfaqA/9d4u5Vtkk7o2S4=
=/17B
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic