Mageia 2019-0020: discount security update
Summary
The __mkd_trim_line function in mkdio.c in libmarkdown.a in DISCOUNT
2.2.3a allows remote attackers to cause a denial of service (heap-based
buffer over-read) via a crafted file (CVE-2018-11468).
DISCOUNT through version 2.2.3a is vulnerable to a Heap-based
buffer-overflow in in the markdown.c:isfootnote() function. An attacker
could exploit this to cause a denial of service (CVE-2018-11503).
DISCOUNT through version 2.2.3a is vulnerable to a Heap-based
buffer-overflow in in the markdown.c:islist() function. An attacker
could exploit this to cause a denial of service (CVE-2018-11504).
The quoteblock function in markdown.c in libmarkdown.a in DISCOUNT
2.2.3a allows remote attackers to cause a denial of service
(heap-based buffer over-read) via a crafted file (CVE-2018-12495).
References
- https://bugs.mageia.org/show_bug.cgi?id=23540
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7RPEBFDVJJU7ZJ2OQIKR35QQENJC2EI3/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11468
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11503
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11504
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12495
Resolution
MGASA-2019-0020 - Updated discount packages fix security vulnerabilities
SRPMS
- 6/core/discount-2.2.4-1.mga6