rhsa-2022_5597
Vulnerability from csaf_redhat
Published
2022-07-18 14:32
Modified
2024-11-15 14:54
Summary
Red Hat Security Advisory: pandoc security update
Notes
Topic
An update for pandoc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Pandoc is a markdown/markup conversion tool. The version of pandoc in RHEL 8 CRB uses cmark-gfm (GitHub's extended version of the C reference implementation of CommonMark) for parts of its conversion. The update, fixes CVE-2022-24724: an integer overflow in cmark-gfm's table row parsing which may lead to heap memory corruption when parsing tables with more than UINT16_MAX columns.
Security Fix(es):
* cmark-gfm: possible RCE due to integer overflow (CVE-2022-24724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for pandoc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Pandoc is a markdown/markup conversion tool. The version of pandoc in RHEL 8 CRB uses cmark-gfm (GitHub\u0027s extended version of the C reference implementation of CommonMark) for parts of its conversion. The update, fixes CVE-2022-24724: an integer overflow in cmark-gfm\u0027s table row parsing which may lead to heap memory corruption when parsing tables with more than UINT16_MAX columns.\n\nSecurity Fix(es):\n\n* cmark-gfm: possible RCE due to integer overflow (CVE-2022-24724)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5597", "url": "https://access.redhat.com/errata/RHSA-2022:5597" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2060662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060662" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5597.json" } ], "title": "Red Hat Security Advisory: pandoc security update", "tracking": { "current_release_date": "2024-11-15T14:54:37+00:00", "generator": { "date": "2024-11-15T14:54:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5597", "initial_release_date": "2022-07-18T14:32:47+00:00", "revision_history": [ { "date": "2022-07-18T14:32:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-18T14:32:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:54:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pandoc-0:2.0.6-6.el8_6.src", "product": { "name": "pandoc-0:2.0.6-6.el8_6.src", "product_id": "pandoc-0:2.0.6-6.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pandoc@2.0.6-6.el8_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "pandoc-0:2.0.6-6.el8_6.aarch64", "product": { "name": "pandoc-0:2.0.6-6.el8_6.aarch64", "product_id": "pandoc-0:2.0.6-6.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pandoc@2.0.6-6.el8_6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "pandoc-0:2.0.6-6.el8_6.ppc64le", "product": { "name": "pandoc-0:2.0.6-6.el8_6.ppc64le", "product_id": "pandoc-0:2.0.6-6.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/pandoc@2.0.6-6.el8_6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "pandoc-0:2.0.6-6.el8_6.x86_64", "product": { "name": "pandoc-0:2.0.6-6.el8_6.x86_64", "product_id": "pandoc-0:2.0.6-6.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pandoc@2.0.6-6.el8_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "pandoc-0:2.0.6-6.el8_6.s390x", "product": { "name": "pandoc-0:2.0.6-6.el8_6.s390x", "product_id": "pandoc-0:2.0.6-6.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pandoc@2.0.6-6.el8_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pandoc-common-0:2.0.6-6.el8_6.noarch", "product": { "name": "pandoc-common-0:2.0.6-6.el8_6.noarch", "product_id": "pandoc-common-0:2.0.6-6.el8_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pandoc-common@2.0.6-6.el8_6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "pandoc-0:2.0.6-6.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.aarch64" }, "product_reference": "pandoc-0:2.0.6-6.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pandoc-0:2.0.6-6.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.ppc64le" }, "product_reference": "pandoc-0:2.0.6-6.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pandoc-0:2.0.6-6.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.s390x" }, "product_reference": "pandoc-0:2.0.6-6.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pandoc-0:2.0.6-6.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.src" }, "product_reference": "pandoc-0:2.0.6-6.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pandoc-0:2.0.6-6.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.x86_64" }, "product_reference": "pandoc-0:2.0.6-6.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "pandoc-common-0:2.0.6-6.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:pandoc-common-0:2.0.6-6.el8_6.noarch" }, "product_reference": "pandoc-common-0:2.0.6-6.el8_6.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24724", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-03-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2060662" } ], "notes": [ { "category": "description", "text": "cmark-gfm is GitHub\u0027s extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm\u0027s table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who\u0027s marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.", "title": "Vulnerability description" }, { "category": "summary", "text": "cmark-gfm: possible RCE due to integer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:pandoc-common-0:2.0.6-6.el8_6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24724" }, { "category": "external", "summary": "RHBZ#2060662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060662" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24724" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-18T14:32:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:pandoc-common-0:2.0.6-6.el8_6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5597" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:pandoc-0:2.0.6-6.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:pandoc-common-0:2.0.6-6.el8_6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cmark-gfm: possible RCE due to integer overflow" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.