CVE-2026-35201

NameCVE-2026-35201
DescriptionDiscount is an implementation of John Gruber's Markdown markup language in C. From 1.3.1.1 to before 2.2.7.4, a signed length truncation bug causes an out-of-bounds read in the default Markdown parse path. Inputs larger than INT_MAX are truncated to a signed int before entering the native parser, allowing the parser to read past the end of the supplied buffer and crash the process. This vulnerability is fixed in 2.2.7.4.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
discount (PTS)bullseye2.2.6-1vulnerable
bookworm2.2.7-2vulnerable
forky, sid, trixie2.2.7-2.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
discountsource(unstable)(unfixed)

Notes

[trixie] - discount <no-dsa> (Minor issue)
[bookworm] - discount <no-dsa> (Minor issue)
https://github.com/davidfstr/rdiscount/security/advisories/GHSA-6r34-94wq-jhrc
https://github.com/davidfstr/rdiscount/commit/b1a16445e92e0d12c07594dedcdc56f80b317761 (2.2.7.4)

Search for package or bug name: Reporting problems