Metrics
Affected Vendors & Products
Thu, 14 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 18 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Oct 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | gomarkdown/markdown: infinite loop via the paragraph function of parser/block.go | |
Weaknesses | CWE-835 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 15 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem. | |
References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-15T00:00:00
Updated: 2024-11-14T16:11:29.351Z
Reserved: 2024-08-21T00:00:00
Link: CVE-2024-44337
Updated: 2024-10-18T19:05:30.855Z
Status : Awaiting Analysis
Published: 2024-10-15T20:15:21.850
Modified: 2024-11-14T16:35:14.613
Link: CVE-2024-44337