md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
The product uses or accesses a resource that has not been initialized.
Link | Tags |
---|---|
https://github.com/mity/md4c/issues/130 | exploit third party advisory patch |