All the vulnerabilites related to github - cmark-gfm
cve-2023-24824
Vulnerability from cvelistv5
Published
2023-03-31 22:01
Modified
2024-08-02 11:03
Severity ?
EPSS score ?
Summary
Quadratic complexity may lead to a denial of service in cmark-gfm
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh | x_refsource_CONFIRM | |
https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:03:19.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh" }, { "name": "https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.10" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `\u003e` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-407", "description": "CWE-407: Inefficient Algorithmic Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T22:01:18.220Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh" }, { "name": "https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/github/cmark-gfm/commit/2300c1bd2c8226108885bf019655c4159cf26b59" } ], "source": { "advisory": "GHSA-66g8-4hjf-77xh", "discovery": "UNKNOWN" }, "title": "Quadratic complexity may lead to a denial of service in cmark-gfm" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-24824", "datePublished": "2023-03-31T22:01:18.220Z", "dateReserved": "2023-01-30T14:43:33.705Z", "dateUpdated": "2024-08-02T11:03:19.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37463
Vulnerability from cvelistv5
Published
2023-07-13 19:22
Modified
2024-10-30 18:48
Severity ?
EPSS score ?
Summary
Quadratic complexity bugs may lead to a denial of service
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5 | x_refsource_CONFIRM | |
https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:30.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5" }, { "name": "https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37463", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-30T18:48:24.298406Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-30T18:48:32.341Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.12" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is an extended version of the C reference implementation of CommonMark, a rationalized version of Markdown syntax with a spec. Three polynomial time complexity issues in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. These vulnerabilities have been patched in 0.29.0.gfm.12.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-13T19:22:16.654Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5" }, { "name": "https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.12" } ], "source": { "advisory": "GHSA-w4qg-3vf7-m9x5", "discovery": "UNKNOWN" }, "title": "Quadratic complexity bugs may lead to a denial of service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37463", "datePublished": "2023-07-13T19:22:16.654Z", "dateReserved": "2023-07-06T13:01:36.997Z", "dateUpdated": "2024-10-30T18:48:32.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39209
Vulnerability from cvelistv5
Published
2022-09-15 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Uncontrolled Resource Consumption in cmark-gfm
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:42.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-cgh3-p57x-9q7q" }, { "tags": [ "x_transferred" ], "url": "https://github.com/github/cmark-gfm/commit/9d57d8a23142b316282bdfc954cb0ecda40a8655" }, { "tags": [ "x_transferred" ], "url": "https://en.wikipedia.org/wiki/Time_complexity" }, { "name": "FEDORA-2022-6bcee2cc93", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMGP65NANDVKPDMXMKYO2ZV2H2HZJY4P/" }, { "name": "FEDORA-2022-f1aed93db8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIUCZN3PEKUCT2JQYQTYOVIJG2KSD6G7/" }, { "name": "FEDORA-2022-dc6d6d9d6c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEAAAI4OULDYQ2TA3HOXH54PC3DCBFZS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.6" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm\u0027s autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c \u0027print(\"![l\"* 100000 + \"\\n\")\u0027 | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-cgh3-p57x-9q7q" }, { "url": "https://github.com/github/cmark-gfm/commit/9d57d8a23142b316282bdfc954cb0ecda40a8655" }, { "url": "https://en.wikipedia.org/wiki/Time_complexity" }, { "name": "FEDORA-2022-6bcee2cc93", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMGP65NANDVKPDMXMKYO2ZV2H2HZJY4P/" }, { "name": "FEDORA-2022-f1aed93db8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIUCZN3PEKUCT2JQYQTYOVIJG2KSD6G7/" }, { "name": "FEDORA-2022-dc6d6d9d6c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEAAAI4OULDYQ2TA3HOXH54PC3DCBFZS/" } ], "source": { "advisory": "GHSA-cgh3-p57x-9q7q", "discovery": "UNKNOWN" }, "title": "Uncontrolled Resource Consumption in cmark-gfm" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39209", "datePublished": "2022-09-15T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:42.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22485
Vulnerability from cvelistv5
Published
2023-01-24 00:26
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
cmark-gfm out-of-bounds read in validate_protocol
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.7" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior 0.29.0.gfm.7, a crafted markdown document can trigger an out-of-bounds read in the `validate_protocol` function. We believe this bug is harmless in practice, because the out-of-bounds read accesses `malloc` metadata without causing any visible damage.This vulnerability has been patched in 0.29.0.gfm.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-24T00:26:57.671Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr" } ], "source": { "advisory": "GHSA-c944-cv5f-hpvr", "discovery": "UNKNOWN" }, "title": "cmark-gfm out-of-bounds read in validate_protocol" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22485", "datePublished": "2023-01-24T00:26:57.671Z", "dateReserved": "2022-12-29T17:41:28.088Z", "dateUpdated": "2024-08-02T10:13:48.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26485
Vulnerability from cvelistv5
Published
2023-03-31 22:01
Modified
2024-08-02 11:53
Severity ?
EPSS score ?
Summary
Quadratic complexity may lead to a denial of service in cmark-gfm
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5 | x_refsource_CONFIRM | |
https://github.com/github/cmark-gfm/commit/07a66c9bc341f902878e37d7da8647d6ef150987 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:52.747Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5" }, { "name": "https://github.com/github/cmark-gfm/commit/07a66c9bc341f902878e37d7da8647d6ef150987", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/commit/07a66c9bc341f902878e37d7da8647d6ef150987" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.10" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `_` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources.\n\n\n\n\n### Impact\n\nA polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service.\n\n### Proof of concept\n\n```\n$ ~/cmark-gfm$ python3 -c \u0027pad = \"_\" * 100000; print(pad + \".\" + pad, end=\"\")\u0027 | time ./build/src/cmark-gfm --to plaintext\n```\n\nIncreasing the number 10000 in the above commands causes the running time to increase quadratically.\n\n### Patches\n\nThis vulnerability have been patched in 0.29.0.gfm.10.\n\n### Note on cmark and cmark-gfm\n\nXXX: TBD\n\n[cmark-gfm](https://github.com/github/cmark-gfm) is a fork of [cmark](https://github.com/commonmark/cmark) that adds the GitHub Flavored Markdown extensions. The two codebases have diverged over time, but share a common core. These bugs affect both `cmark` and `cmark-gfm`. \n\n### Credit\n\nWe would like to thank @gravypod for reporting this vulnerability.\n\n### References\n\nhttps://en.wikipedia.org/wiki/Time_complexity\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Open an issue in [github/cmark-gfm](https://github.com/github/cmark-gfm)\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-407", "description": "CWE-407: Inefficient Algorithmic Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T22:01:16.350Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5" }, { "name": "https://github.com/github/cmark-gfm/commit/07a66c9bc341f902878e37d7da8647d6ef150987", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/github/cmark-gfm/commit/07a66c9bc341f902878e37d7da8647d6ef150987" } ], "source": { "advisory": "GHSA-r8vr-c48j-fcc5", "discovery": "UNKNOWN" }, "title": "Quadratic complexity may lead to a denial of service in cmark-gfm" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-26485", "datePublished": "2023-03-31T22:01:16.350Z", "dateReserved": "2023-02-23T23:22:58.575Z", "dateUpdated": "2024-08-02T11:53:52.747Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5238
Vulnerability from cvelistv5
Published
2020-07-01 23:05
Modified
2024-08-04 08:22
Severity ?
EPSS score ?
Summary
Denial of service in table parsing in cmark-gfm
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85 | x_refsource_CONFIRM | |
https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCDHBTUFIOYRIS5HAS6PZNBNMB7IOAX3/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGJH2A4VAV54X6NSCNNGSEIGIIY5N2VR/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMQFOQQCWOAMQ4I2XIVCVOXXIJ75HDCW/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:22:09.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4" }, { "name": "FEDORA-2020-c39d7a562c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCDHBTUFIOYRIS5HAS6PZNBNMB7IOAX3/" }, { "name": "FEDORA-2020-1eaffe0013", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGJH2A4VAV54X6NSCNNGSEIGIIY5N2VR/" }, { "name": "FEDORA-2020-fe299b3fa3", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMQFOQQCWOAMQ4I2XIVCVOXXIJ75HDCW/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This issue does not affect the upstream cmark project. The issue has been fixed in version 0.29.0.gfm.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T16:06:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4" }, { "name": "FEDORA-2020-c39d7a562c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCDHBTUFIOYRIS5HAS6PZNBNMB7IOAX3/" }, { "name": "FEDORA-2020-1eaffe0013", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGJH2A4VAV54X6NSCNNGSEIGIIY5N2VR/" }, { "name": "FEDORA-2020-fe299b3fa3", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMQFOQQCWOAMQ4I2XIVCVOXXIJ75HDCW/" } ], "source": { "advisory": "GHSA-7gc6-9qr5-hc85", "discovery": "UNKNOWN" }, "title": "Denial of service in table parsing in cmark-gfm", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-5238", "STATE": "PUBLIC", "TITLE": "Denial of service in table parsing in cmark-gfm" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "cmark-gfm", "version": { "version_data": [ { "version_value": "\u003c 0.29.0.gfm.1" } ] } } ] }, "vendor_name": "github" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This issue does not affect the upstream cmark project. The issue has been fixed in version 0.29.0.gfm.1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85", "refsource": "CONFIRM", "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85" }, { "name": "https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4", "refsource": "MISC", "url": "https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4" }, { "name": "FEDORA-2020-c39d7a562c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCDHBTUFIOYRIS5HAS6PZNBNMB7IOAX3/" }, { "name": "FEDORA-2020-1eaffe0013", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGJH2A4VAV54X6NSCNNGSEIGIIY5N2VR/" }, { "name": "FEDORA-2020-fe299b3fa3", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WMQFOQQCWOAMQ4I2XIVCVOXXIJ75HDCW/" } ] }, "source": { "advisory": "GHSA-7gc6-9qr5-hc85", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-5238", "datePublished": "2020-07-01T23:05:15", "dateReserved": "2020-01-02T00:00:00", "dateUpdated": "2024-08-04T08:22:09.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22483
Vulnerability from cvelistv5
Published
2023-01-23 22:36
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
cmark-gfm Quadratic complexity bugs may lead to a denial of service
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.7" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to several polynomial time complexity issues in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. Various commands, when piped to cmark-gfm with large values, cause the running time to increase quadratically. These vulnerabilities have been patched in version 0.29.0.gfm.7.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-23T22:36:14.574Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c" } ], "source": { "advisory": "GHSA-29g3-96g3-jg6c", "discovery": "UNKNOWN" }, "title": "cmark-gfm Quadratic complexity bugs may lead to a denial of service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22483", "datePublished": "2023-01-23T22:36:14.574Z", "dateReserved": "2022-12-29T17:41:28.088Z", "dateUpdated": "2024-08-02T10:13:48.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22051
Vulnerability from cvelistv5
Published
2024-01-04 20:27
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
CommonMarker Integer Overflow Vulnerability
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:34.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "related", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3" }, { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://github.com/advisories/GHSA-fmx4-26r3-wxpf" }, { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-fmx4-26r3-wxpf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://rubygems.org", "defaultStatus": "unaffected", "packageName": "commonmarker", "versions": [ { "lessThan": "0.23.4", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns.\u003c/p\u003e" } ], "value": "CommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This vulnerability can result in possibly unauthenticated remote attackers to cause heap memory corruption, potentially leading to an information leak or remote code execution, via parsing tables with marker rows that contain more than UINT16_MAX columns.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-04T20:27:22.197Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "related" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x" }, { "tags": [ "vendor-advisory" ], "url": "https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf" }, { "tags": [ "patch" ], "url": "https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3" }, { "tags": [ "third-party-advisory" ], "url": "https://github.com/advisories/GHSA-fmx4-26r3-wxpf" }, { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/vc-advisory-GHSA-fmx4-26r3-wxpf" } ], "source": { "discovery": "INTERNAL" }, "title": "CommonMarker Integer Overflow Vulnerability" } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-22051", "datePublished": "2024-01-04T20:27:22.197Z", "dateReserved": "2024-01-04T18:44:53.108Z", "dateUpdated": "2024-08-01T22:35:34.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22484
Vulnerability from cvelistv5
Published
2023-01-23 22:42
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
Inefficient Quadratic complexity bug in handle_pointy_brace may lead to a denial of service
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.7" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to a polynomial time complexity issue in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-407", "description": "CWE-407: Inefficient Algorithmic Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-23T22:42:57.790Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r" } ], "source": { "advisory": "GHSA-24f7-9frr-5h2r", "discovery": "UNKNOWN" }, "title": "Inefficient Quadratic complexity bug in handle_pointy_brace may lead to a denial of service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22484", "datePublished": "2023-01-23T22:42:57.790Z", "dateReserved": "2022-12-29T17:41:28.088Z", "dateUpdated": "2024-08-02T10:13:48.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24724
Vulnerability from cvelistv5
Published
2022-03-03 19:35
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Integer overflow in table parsing extension leads to heap memory corruption
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x" }, { "name": "FEDORA-2022-557ad15f2e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55K6VNVKO2G5SNKRCQ2KDG5SKTX5PVV/" }, { "name": "FEDORA-2022-725edc74c0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJBFIJEHJZEEDG6MO4MQHZYKUXELH77O/" }, { "name": "FEDORA-2022-bc43bafcfd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7V3HAM5H6YFJG2QFEXACZR3XVWFTXTC/" }, { "name": "FEDORA-2022-c42d02e5e5", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5CYUU662VO6CCXQKVZVOHXX3RGIF2DLQ/" }, { "name": "FEDORA-2022-79b9a59e3b", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSKUOJ2VAYGTJXPDE2RRPMNLVVMKCI77/" }, { "name": "FEDORA-2022-1f981071eb", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KH4UQA6VWVZU5EW3HNEAB7D7BTCNJSJ2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.28.3.gfm.21" }, { "status": "affected", "version": "\u003e= 0.29.0.gfm.0, \u003c 0.29.0.gfm.3" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm\u0027s table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who\u0027s marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-06T17:07:50", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x" }, { "name": "FEDORA-2022-557ad15f2e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55K6VNVKO2G5SNKRCQ2KDG5SKTX5PVV/" }, { "name": "FEDORA-2022-725edc74c0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJBFIJEHJZEEDG6MO4MQHZYKUXELH77O/" }, { "name": "FEDORA-2022-bc43bafcfd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7V3HAM5H6YFJG2QFEXACZR3XVWFTXTC/" }, { "name": "FEDORA-2022-c42d02e5e5", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5CYUU662VO6CCXQKVZVOHXX3RGIF2DLQ/" }, { "name": "FEDORA-2022-79b9a59e3b", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSKUOJ2VAYGTJXPDE2RRPMNLVVMKCI77/" }, { "name": "FEDORA-2022-1f981071eb", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KH4UQA6VWVZU5EW3HNEAB7D7BTCNJSJ2/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html" } ], "source": { "advisory": "GHSA-mc3g-88wq-6f4x", "discovery": "UNKNOWN" }, "title": "Integer overflow in table parsing extension leads to heap memory corruption", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24724", "STATE": "PUBLIC", "TITLE": "Integer overflow in table parsing extension leads to heap memory corruption" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "cmark-gfm", "version": { "version_data": [ { "version_value": "\u003c 0.28.3.gfm.21" }, { "version_value": "\u003e= 0.29.0.gfm.0, \u003c 0.29.0.gfm.3" } ] } } ] }, "vendor_name": "github" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cmark-gfm is GitHub\u0027s extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm\u0027s table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who\u0027s marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190: Integer Overflow or Wraparound" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x", "refsource": "CONFIRM", "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x" }, { "name": "FEDORA-2022-557ad15f2e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55K6VNVKO2G5SNKRCQ2KDG5SKTX5PVV/" }, { "name": "FEDORA-2022-725edc74c0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJBFIJEHJZEEDG6MO4MQHZYKUXELH77O/" }, { "name": "FEDORA-2022-bc43bafcfd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7V3HAM5H6YFJG2QFEXACZR3XVWFTXTC/" }, { "name": "FEDORA-2022-c42d02e5e5", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CYUU662VO6CCXQKVZVOHXX3RGIF2DLQ/" }, { "name": "FEDORA-2022-79b9a59e3b", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSKUOJ2VAYGTJXPDE2RRPMNLVVMKCI77/" }, { "name": "FEDORA-2022-1f981071eb", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KH4UQA6VWVZU5EW3HNEAB7D7BTCNJSJ2/" }, { "name": "http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html" } ] }, "source": { "advisory": "GHSA-mc3g-88wq-6f4x", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24724", "datePublished": "2022-03-03T19:35:09", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22486
Vulnerability from cvelistv5
Published
2023-01-24 02:30
Modified
2024-08-02 10:13
Severity ?
EPSS score ?
Summary
cmark-gfm Quadratic complexity bug in handle_close_bracket may lead to a denial of service
References
▼ | URL | Tags |
---|---|---|
https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "cmark-gfm", "vendor": "github", "versions": [ { "status": "affected", "version": "\u003c 0.29.0.gfm.7" } ] } ], "descriptions": [ { "lang": "en", "value": "cmark-gfm is GitHub\u0027s fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 contain a polynomial time complexity issue in handle_close_bracket that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-407", "description": "CWE-407: Inefficient Algorithmic Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-24T02:30:29.099Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p" } ], "source": { "advisory": "GHSA-r572-jvj2-3m8p", "discovery": "UNKNOWN" }, "title": "cmark-gfm Quadratic complexity bug in handle_close_bracket may lead to a denial of service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22486", "datePublished": "2023-01-24T02:30:29.099Z", "dateReserved": "2022-12-29T17:41:28.088Z", "dateUpdated": "2024-08-02T10:13:48.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }