CVE-2024-44337 Affecting golang-github-gomarkdown-markdown package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-GOLANGGITHUBGOMARKDOWNMARKDOWN-8233177
  • published19 Oct 2024
  • disclosed15 Oct 2024

Introduced: 15 Oct 2024

CVE-2024-44337  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 golang-github-gomarkdown-markdown.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-gomarkdown-markdown package and not the golang-github-gomarkdown-markdown package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

The package github.com/gomarkdown/markdown is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion v0.0.0-20240729232818-a2a9c4f, which corresponds with commit a2a9c4f76ef5a5c32108e36f7c47f8d310322252, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit a2a9c4f76ef5a5c32108e36f7c47f8d310322252 contains fixes to this problem.