6.5
CVSSv3

CVE-2022-39209

Published: 15/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions before 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print("![l"* 100000 + "\n")' | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

github cmark-gfm

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

Vendor Advisories

Debian Bug report logs - #1020588 cmark-gfm: CVE-2022-39209 Package: src:cmark-gfm; Maintainer for src:cmark-gfm is Keith Packard <keithp@keithpcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 23 Sep 2022 20:24:02 UTC Severity: important Tags: security, upstream Found in version cmark-gfm/029 ...
Description The MITRE CVE dictionary describes this issue as: cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C In versions prior to 0290gfm6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service Users ...