GO-2021-0238

See a problem?
Source
https://pkg.go.dev/vuln/GO-2021-0238
Import Source
https://vuln.go.dev/ID/GO-2021-0238.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2021-0238
Aliases
Published
2022-02-17T17:33:43Z
Modified
2024-05-20T16:03:47Z
Summary
Infinite loop when parsing inputs in golang.org/x/net/html
Details

An attacker can craft an input to ParseFragment that causes it to enter an infinite loop and never return.

References
Credits
    • OSS-Fuzz (discovery)
    • Andrew Thornton (reporter)

Affected packages

Go / golang.org/x/net

Package

Name
golang.org/x/net
View open source insights on deps.dev
Purl
pkg:golang/golang.org/x/net

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20210520170846-37e1c6afe023

Ecosystem specific

{
    "imports": [
        {
            "path": "golang.org/x/net/html",
            "symbols": [
                "Parse",
                "ParseFragment",
                "ParseFragmentWithOptions",
                "ParseWithOptions",
                "inHeadIM"
            ]
        }
    ]
}