Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xhr3-wf7j-h255 | Infinite loop in github.com/gomarkdown/markdown |
Thu, 14 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 18 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Oct 2024 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | gomarkdown/markdown: infinite loop via the paragraph function of parser/block.go | |
| Weaknesses | CWE-835 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 15 Oct 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `v0.0.0-20240729232818-a2a9c4f`, which corresponds with commit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252`, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit `a2a9c4f76ef5a5c32108e36f7c47f8d310322252` contains fixes to this problem. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-14T16:11:29.351Z
Reserved: 2024-08-21T00:00:00.000Z
Link: CVE-2024-44337
Updated: 2024-10-18T19:05:30.855Z
Status : Deferred
Published: 2024-10-15T20:15:21.850
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-44337
OpenCVE Enrichment
Updated: 2025-07-12T22:31:31Z
Github GHSA