漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
github.com/gomarkdown/markdown Out-of-bounds Read while parsing citations
Vulnerability Description
The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `0.0.0-20230922105210-14b16010c2ee`, which corresponds with commit `14b16010c2ee7ff33a940a541d993bd043a88940`, parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability. To exploit the vulnerability, parser needs to have `parser.Mmark` extension set. The panic occurs inside the `citation.go` file on the line 69 when the parser tries to access the element past its length. This can result in a denial of service. Commit `14b16010c2ee7ff33a940a541d993bd043a88940`/pseudoversion `0.0.0-20230922105210-14b16010c2ee` contains a patch for this issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
跨界内存读
Vulnerability Title
Markdown 缓冲区错误漏洞
Vulnerability Description
Markdown是gomarkdown开源的一个用于解析 Markdown 文本并渲染为 HTML 的 Go 库。 gomarkdown/markdown 0.0.0-20230922105210-14b16010c2ee之前版本存在缓冲区错误漏洞,该漏洞源于使用parser.Mmark扩展的解析器解析格式错误的输入时会导致越界读取漏洞。
CVSS Information
N/A
Vulnerability Type
N/A