{"id":"CVE-2021-30027","details":"md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document.","modified":"2026-04-11T17:12:20.871662Z","published":"2021-04-29T15:15:11.020Z","references":[{"type":"REPORT","url":"https://github.com/mity/md4c/issues/155"},{"type":"FIX","url":"https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mity/md4c","events":[{"introduced":"0"},{"last_affected":"aa63198b80f999effed125b55ac16d1cbc9ab21c"},{"fixed":"4fc808d8fe8d8904f8525bb4231d854f45e23a19"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.4.7"}]}}],"versions":["release-0.2.0","release-0.2.1","release-0.2.3","release-0.2.4","release-0.2.5","release-0.2.6","release-0.2.7","release-0.3.0","release-0.3.0-rc","release-0.3.1","release-0.3.2","release-0.3.3","release-0.3.4","release-0.4.0","release-0.4.1","release-0.4.2","release-0.4.3","release-0.4.4","release-0.4.5","release-0.4.6","release-0.4.7"],"database_specific":{"vanir_signatures_modified":"2026-04-11T17:12:20Z","vanir_signatures":[{"digest":{"length":10908,"function_hash":"322245608022275724480425469479335526165"},"signature_version":"v1","target":{"function":"md_analyze_line","file":"src/md4c.c"},"signature_type":"Function","id":"CVE-2021-30027-aafeb3c5","source":"https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19","deprecated":false},{"digest":{"threshold":0.9,"line_hashes":["128530702601737101811727024586890550753","98473776384372157529680730225100509720","282087636836527325486394792471415280100","313970169583545866153292837680168776702","283521056716158467520872169441972465266","321152261436292213196061633460465514572","199537899354753774750169400073557411872","202499592155105600623179137581181437845","174112236338003714963880316886125584952","64528996485019690033480507456819749288","40781584929695501939010212285647372006","211144263441560594281229750485882864073","108532761455042207769192576660881309813","301004014917007072830086453236187746024","159215856006652495965340164355596265201","338671760556097010649039124482390622635","310442026149672368764116397330189875207","247800360932106444803672585103536412825","174798969617264694913491682126884538618","81105429030443539012110219833419686059","34773241901086520411897294352802850480","216350882354716231614067117431856901232","214563497792942822017538392314037574131","274558718265672796844056938807883132573","82345420663438109749465528145197249249","306622871234171740882970515189805638101","186240891863141040798060690227249672488","181478689956031745429399673169121431810","202559148123131947237765628721083981518","255237651156812476656622229190067102892"]},"signature_version":"v1","target":{"file":"src/md4c.c"},"signature_type":"Line","id":"CVE-2021-30027-f3156ffc","source":"https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19","deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-30027.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}