[Bug 1231717] New: VUL-0: CVE-2024-44337: eksctl: gomarkdown/markdown: logical problem in the paragraph function of parser/block.go leads to infinite loop
https://bugzilla.suse.com/show_bug.cgi?id=1231717 Bug ID: 1231717 Summary: VUL-0: CVE-2024-44337: eksctl: gomarkdown/markdown: logical problem in the paragraph function of parser/block.go leads to infinite loop Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/424098/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: opensuse_buildservice@ojkastl.de Reporter: camila.matos@suse.com QA Contact: security-team@suse.de CC: camila.matos@suse.com, security-team@suse.de, smash_bz@suse.de Blocks: 1231713 Target Milestone: --- Found By: Security Response Team Blocker: --- +++ This bug was initially created as a clone of Bug #1231713 +++ The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-44337 https://bugzilla.redhat.com/show_bug.cgi?id=2318862 https://www.cve.org/CVERecord?id=CVE-2024-44337 https://github.com/Brinmon/CVE-2024-44337 https://github.com/gomarkdown/markdown/commit/a2a9c4f76ef5a5c32108e36f7c47f8... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1231717 https://bugzilla.suse.com/show_bug.cgi?id=1231717#c1 --- Comment #1 from Camila Camargo de Matos <camila.matos@suse.com> --- openSUSE:Factory/eksctl depends on a vulnerable version of gomarkdown/markdown. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1231717 SMASH SMASH <smash_bz@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1231717 https://bugzilla.suse.com/show_bug.cgi?id=1231717#c2 --- Comment #2 from Johannes Kastl <opensuse_buildservice@ojkastl.de> --- Thanks for the report. As far as I can see, 0.192.0 uses a vulnerable version: $ grep gomarkdown go.mod github.com/gomarkdown/markdown v0.0.0-20230922112808-5421fefb8386 // indirect $ Upstream is still using this version. https://github.com/eksctl-io/eksctl/blob/main/go.mod#L216 Did anyone report this to upstream already? Kind Regards, Johannes -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1231717 https://bugzilla.suse.com/show_bug.cgi?id=1231717#c3 --- Comment #3 from Camila Camargo de Matos <camila.matos@suse.com> --- (In reply to Johannes Kastl from comment #2)
Thanks for the report.
As far as I can see, 0.192.0 uses a vulnerable version:
$ grep gomarkdown go.mod github.com/gomarkdown/markdown v0.0.0-20230922112808-5421fefb8386 // indirect $
Upstream is still using this version. https://github.com/eksctl-io/eksctl/blob/main/go.mod#L216
Did anyone report this to upstream already?
Kind Regards, Johannes
I don't think that this has been reported in the eksctl upstream, only in the gomarkdown/markdown upstream. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1231717 https://bugzilla.suse.com/show_bug.cgi?id=1231717#c4 --- Comment #4 from Camila Camargo de Matos <camila.matos@suse.com> --- (In reply to Camila Camargo de Matos from comment #3)
(In reply to Johannes Kastl from comment #2)
Thanks for the report.
As far as I can see, 0.192.0 uses a vulnerable version:
$ grep gomarkdown go.mod github.com/gomarkdown/markdown v0.0.0-20230922112808-5421fefb8386 // indirect $
Upstream is still using this version. https://github.com/eksctl-io/eksctl/blob/main/go.mod#L216
Did anyone report this to upstream already?
Kind Regards, Johannes
I don't think that this has been reported in the eksctl upstream, only in the gomarkdown/markdown upstream.
See https://github.com/gomarkdown/markdown/issues/311. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1231717 https://bugzilla.suse.com/show_bug.cgi?id=1231717#c5 Johannes Kastl <opensuse_buildservice@ojkastl.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS Flags| |needinfo? --- Comment #5 from Johannes Kastl <opensuse_buildservice@ojkastl.de> --- reported to upstream, waiting on feedback from upstream maintainers -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com