Skip to content

Closes #64 Inorder to fix CVE-2024-44337, github.com/gomarkdown/markdown must be upgraded to version 0.0.0-20240729212818-a2a9c4f76ef5 #65

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

shravanjoshi88
Copy link

Changes in this PR:

Description:
Vulnerability [CVE-2024-44337] is detected one of the dependency github.com/gomarkdown/markdown. Inorder to fix this vulnerability, github.com/gomarkdown/markdown must be upgraded to version 0.0.0-20240729212818-a2a9c4f76ef5

CVSS Score : 5.1 (Medium)
Severity: Medium
Category "CWE-835 | Loop with Unreachable Exit Condition ('Infinite Loop')
Exploitability: EPSS 3.1% (86th percentile)

Vulnerability score: CVSS: 3

Advisory: GHSA-xhr3-wf7j-h255
Package: github.com/golang-jwt/jwt/v4
Affected versions< 0.0.0-20240729212818-a2a9c4f76ef5
Patched versions = 0.0.0-20240729212818-a2a9c4f76ef5

CVE Details:
The package github.com/gomarkdown/markdown is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion v0.0.0-20240729232818-a2a9c4f, which corresponds with commit a2a9c4f76ef5a5c32108e36f7c47f8d310322252, there was a logical problem in the paragraph function of the parser/block.go file, which allowed a remote attacker to cause a denial of service (DoS) condition by providing a tailor-made input that caused an infinite loop, causing the program to hang and consume resources indefinitely. Submit a2a9c4f76ef5a5c32108e36f7c47f8d310322252 contains fixes to this problem.

References
https://nvd.nist.gov/vuln/detail/CVE-2024-44337
gomarkdown/markdown@a2a9c4f
https://github.com/Brinmon/CVE-2024-44337
https://pkg.go.dev/vuln/GO-2024-3205

@shravanjoshi88 shravanjoshi88 requested a review from a team as a code owner April 9, 2025 14:14
@shravanjoshi88
Copy link
Author

@jamietanna @mromaszewicz, can you please review changes in PR. It only upgrades github.com/gomarkdown/markdown to latest version. We are using this package in our APIs and in order to comply with our organisation's risk control policies, the vulnerability [https://github.com/advisories/GHSA-xhr3-wf7j-h255] must be resolved. We would really appreciate if a new version with this fix is available soon. Thanks in advance!

@jamietanna
Copy link
Member

Thanks @shravanjoshi88 I've replied in #64 - happy to continue discussing in this PR or the issue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants