Name | CVE-2020-5238 |
Description | The table extension in GitHub Flavored Markdown before version 0.29.0.gfm.1 takes O(n * n) time to parse certain inputs. An attacker could craft a markdown table which would take an unreasonably long time to process, causing a denial of service. This issue does not affect the upstream cmark project. The issue has been fixed in version 0.29.0.gfm.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 965980, 965981, 965982, 965983, 965984 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
cmark-gfm (PTS) | buster | 0.28.3.gfm.19-3 | vulnerable |
bullseye | 0.29.0.gfm.0-6 | vulnerable | |
sid, trixie, bookworm | 0.29.0.gfm.6-6 | fixed | |
haskell-cmark-gfm (PTS) | buster | 0.1.5-2 | vulnerable |
bullseye | 0.2.1+ds1-1 | fixed | |
bookworm | 0.2.5+ds1-1 | fixed | |
sid, trixie | 0.2.5+ds1-3 | fixed | |
python-cmarkgfm (PTS) | buster, bullseye | 0.4.2-1 | vulnerable |
sid, trixie, bookworm | 0.8.0-3 | fixed | |
r-cran-commonmark (PTS) | buster | 1.7-1 | vulnerable |
bullseye | 1.7-2 | vulnerable | |
bookworm | 1.8.1-1 | fixed | |
trixie | 1.9.1-1 | fixed | |
sid | 1.9.2-1 | fixed | |
ruby-commonmarker (PTS) | buster | 0.17.9-1 | vulnerable |
bullseye | 0.21.0-1 | fixed | |
bookworm | 0.23.6-1 | fixed | |
sid, trixie | 0.23.10-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
cmark-gfm | source | (unstable) | 0.29.0.gfm.2-1 | 965984 | ||
haskell-cmark-gfm | source | (unstable) | 0.2.1+ds1-1 | 965982 | ||
python-cmarkgfm | source | (unstable) | 0.7.0-1 | 965983 | ||
r-cran-commonmark | source | (unstable) | 1.8.0-1 | 965980 | ||
ruby-commonmarker | source | (unstable) | 0.21.0-1 | 965981 |
[bullseye] - cmark-gfm <no-dsa> (Minor issue)
[buster] - cmark-gfm <no-dsa> (Minor issue)
[bullseye] - python-cmarkgfm <no-dsa> (Minor issue)
[buster] - python-cmarkgfm <no-dsa> (Minor issue)
[buster] - ruby-commonmarker <no-dsa> (Minor issue)
[buster] - haskell-cmark-gfm <no-dsa> (Minor issue)
[bullseye] - r-cran-commonmark <no-dsa> (Minor issue)
[buster] - r-cran-commonmark <no-dsa> (Minor issue)
https://github.com/github/cmark-gfm/security/advisories/GHSA-7gc6-9qr5-hc85
https://github.com/github/cmark-gfm/commit/85d895289c5ab67f988ca659493a64abb5fec7b4
haskell-cmark-gfm switched to src:cmark-gfm in 0.2.1+ds1-1, marking that as fixed (despite cmark-gfm not fixed yet)
https://github.com/theacodes/cmarkgfm/commit/00b8e84050ee46fd621672cfa0114843fd10e6e5 (0.7.0)