CVE-2026-4833
Publication date 27 March 2026
Last updated 27 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A weakness has been identified in Orc discount up to 3.0.1.2. This issue affects the function compile of the file markdown.c of the component Markdown Handler. This manipulation causes uncontrolled recursion. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project maintainer confirms: "[I]f you feed it an infinitely deep blockquote input it will crash. (...) [T]his is a duplicate of an old bug that I've been working on."
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| discount | 25.10 questing |
Needs evaluation
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2026-4833
- https://github.com/Orc/discount/
- https://github.com/Orc/discount/issues/305
- https://github.com/Orc/discount/issues/305#issuecomment-4027546673
- https://github.com/user-attachments/files/25847391/crash00.md
- https://vuldb.com/?ctiid.353138
- https://vuldb.com/?id.353138
- https://vuldb.com/?submit.775841