Out-of-bounds Read Affecting golang-github-gomarkdown-markdown package, versions <0.0~git20231115.a660076-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.1% (43rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-GOLANGGITHUBGOMARKDOWNMARKDOWN-5916511
  • published25 Sept 2023
  • disclosed22 Sept 2023

Introduced: 22 Sep 2023

CVE-2023-42821  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Debian:13 golang-github-gomarkdown-markdown to version 0.0~git20231115.a660076-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-gomarkdown-markdown package and not the golang-github-gomarkdown-markdown package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

The package github.com/gomarkdown/markdown is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion 0.0.0-20230922105210-14b16010c2ee, which corresponds with commit 14b16010c2ee7ff33a940a541d993bd043a88940, parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability. To exploit the vulnerability, parser needs to have parser.Mmark extension set. The panic occurs inside the citation.go file on the line 69 when the parser tries to access the element past its length. This can result in a denial of service. Commit 14b16010c2ee7ff33a940a541d993bd043a88940/pseudoversion 0.0.0-20230922105210-14b16010c2ee contains a patch for this issue.

CVSS Scores

version 3.1