Name | CVE-2022-39209 |
Description | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print("![l"* 100000 + "\n")' | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1020588, 1034887, 1034888 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
cmark-gfm (PTS) | buster | 0.28.3.gfm.19-3 | vulnerable |
bullseye | 0.29.0.gfm.0-6 | vulnerable | |
sid, trixie, bookworm | 0.29.0.gfm.6-6 | fixed | |
ghostwriter (PTS) | buster | 1.7.4-2 | vulnerable |
bullseye | 1.8.1-2 | vulnerable | |
bookworm | 2.1.6+ds-2 | fixed | |
trixie | 23.04.3+ds-1 | fixed | |
sid | 24.12.0+ds-1 | fixed | |
python-cmarkgfm (PTS) | buster, bullseye | 0.4.2-1 | vulnerable |
sid, trixie, bookworm | 0.8.0-3 | vulnerable | |
r-cran-commonmark (PTS) | buster | 1.7-1 | vulnerable |
bullseye | 1.7-2 | vulnerable | |
bookworm | 1.8.1-1 | fixed | |
sid, trixie | 1.9.2-2 | fixed | |
ruby-commonmarker (PTS) | buster | 0.17.9-1 | vulnerable |
bullseye | 0.21.0-1 | vulnerable | |
bookworm | 0.23.6-1 | vulnerable | |
sid, trixie | 0.23.10-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
cmark-gfm | source | (unstable) | 0.29.0.gfm.6-2 | 1020588 | ||
ghostwriter | source | (unstable) | 2.1.6+ds-1 | unimportant | ||
python-cmarkgfm | source | (unstable) | (unfixed) | 1034887 | ||
r-cran-commonmark | source | (unstable) | 1.8.1-1 | |||
ruby-commonmarker | source | (unstable) | (unfixed) | 1034888 |
[bookworm] - cmark-gfm <no-dsa> (Minor issue)
[bullseye] - cmark-gfm <no-dsa> (Minor issue)
[buster] - cmark-gfm <no-dsa> (Minor issue)
[bookworm] - python-cmarkgfm <no-dsa> (Minor issue)
[bullseye] - python-cmarkgfm <no-dsa> (Minor issue)
[buster] - python-cmarkgfm <no-dsa> (Minor issue)
[bookworm] - ruby-commonmarker <ignored> (Minor issue)
[bullseye] - ruby-commonmarker <no-dsa> (Minor issue)
[buster] - ruby-commonmarker <no-dsa> (Minor issue)
[bullseye] - r-cran-commonmark <no-dsa> (Minor issue)
[buster] - r-cran-commonmark <no-dsa> (Minor issue)
https://github.com/github/cmark-gfm/security/advisories/GHSA-cgh3-p57x-9q7q
https://github.com/github/cmark-gfm/commit/cfcaa0068bf319974fdec283416fcee5035c2d70 (0.29.0.gfm.6)
For ghostwriter just a hang/crash in GUI tool, no security impact
https://github.com/theacodes/cmarkgfm/commit/d6bb964c5b27ecf5deb76f0d1ce5e9274cb877ff (2022.10.27)