GHSA-xhr3-wf7j-h255

Suggest an improvement
Source
https://github.com/advisories/GHSA-xhr3-wf7j-h255
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-xhr3-wf7j-h255/GHSA-xhr3-wf7j-h255.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xhr3-wf7j-h255
Aliases
Published
2024-10-15T21:30:39Z
Modified
2024-12-12T17:59:12Z
Severity
  • 5.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVSS Calculator
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Infinite loop in github.com/gomarkdown/markdown
Details

The package github.com/gomarkdown/markdown is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion v0.0.0-20240729232818-a2a9c4f, which corresponds with commit a2a9c4f76ef5a5c32108e36f7c47f8d310322252, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit a2a9c4f76ef5a5c32108e36f7c47f8d310322252 contains fixes to this problem.

Database specific
{
    "nvd_published_at": "2024-10-15T20:15:21Z",
    "cwe_ids": [
        "CWE-835"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-10-16T14:09:50Z"
}
References

Affected packages

Go / github.com/gomarkdown/markdown

Package

Name
github.com/gomarkdown/markdown
View open source insights on deps.dev
Purl
pkg:golang/github.com/gomarkdown/markdown

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20240729212818-a2a9c4f76ef5