markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
References
Link | Resource |
---|---|
https://github.com/trentm/python-markdown2/pull/387 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH/ | Mailing List Third Party Advisory |
Information
Published : 2021-03-03 08:15
Updated : 2022-05-23 09:00
NVD link : CVE-2021-26813
Mitre link : CVE-2021-26813
JSON object : View
CWE
Products Affected
markdown2_project
- markdown2
fedoraproject
- fedora