Debian Package Tracker
Register | Log in
Subscribe

cmark-gfm

CommonMark parsing and rendering program, GitHub flavor

Choose email to subscribe with

general
  • source: cmark-gfm (main)
  • version: 0.29.0.gfm.13-4
  • maintainer: Keith Packard (DMD)
  • arch: any
  • std-ver: 4.7.0
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.28.3.gfm.19-3
  • oldstable: 0.29.0.gfm.0-6
  • stable: 0.29.0.gfm.6-6
  • testing: 0.29.0.gfm.13-4
  • unstable: 0.29.0.gfm.13-4
versioned links
  • 0.28.3.gfm.19-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.29.0.gfm.0-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.29.0.gfm.6-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.29.0.gfm.13-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • cmark-gfm (1 bugs: 0, 1, 0, 0)
  • libcmark-gfm-dev
  • libcmark-gfm-extensions-dev
  • libcmark-gfm-extensions0.29.0.gfm.13
  • libcmark-gfm0.29.0.gfm.13
action needed
7 low-priority security issues in bookworm low

There are 7 open security issues in bookworm.

7 issues left for the package maintainer to handle:
  • CVE-2023-22483: (needs triaging) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to several polynomial time complexity issues in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. Various commands, when piped to cmark-gfm with large values, cause the running time to increase quadratically. These vulnerabilities have been patched in version 0.29.0.gfm.7.
  • CVE-2023-22484: (needs triaging) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to a polynomial time complexity issue in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7.
  • CVE-2023-22485: (needs triaging) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior 0.29.0.gfm.7, a crafted markdown document can trigger an out-of-bounds read in the `validate_protocol` function. We believe this bug is harmless in practice, because the out-of-bounds read accesses `malloc` metadata without causing any visible damage.This vulnerability has been patched in 0.29.0.gfm.7.
  • CVE-2023-22486: (needs triaging) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 contain a polynomial time complexity issue in handle_close_bracket that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7.
  • CVE-2023-24824: (needs triaging) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources.
  • CVE-2023-26485: (needs triaging) cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `_` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources. ### Impact A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. ### Proof of concept ``` $ ~/cmark-gfm$ python3 -c 'pad = "_" * 100000; print(pad + "." + pad, end="")' | time ./build/src/cmark-gfm --to plaintext ``` Increasing the number 10000 in the above commands causes the running time to increase quadratically. ### Patches This vulnerability have been patched in 0.29.0.gfm.10. ### Note on cmark and cmark-gfm XXX: TBD [cmark-gfm](https://github.com/github/cmark-gfm) is a fork of [cmark](https://github.com/commonmark/cmark) that adds the GitHub Flavored Markdown extensions. The two codebases have diverged over time, but share a common core. These bugs affect both `cmark` and `cmark-gfm`. ### Credit We would like to thank @gravypod for reporting this vulnerability. ### References https://en.wikipedia.org/wiki/Time_complexity ### For more information If you have any questions or comments about this advisory: * Open an issue in [github/cmark-gfm](https://github.com/github/cmark-gfm)
  • CVE-2023-37463: (needs triaging) cmark-gfm is an extended version of the C reference implementation of CommonMark, a rationalized version of Markdown syntax with a spec. Three polynomial time complexity issues in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. These vulnerabilities have been patched in 0.29.0.gfm.12.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-02-27 05:02
debian/patches: 6 patches to forward upstream low

Among the 6 debian patches available in version 0.29.0.gfm.13-4 of the package, we noticed the following issues:

  • 6 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-01-06 08:04
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2022-12-29 Last update: 2022-12-29 12:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-02-27 13:25
news
[rss feed]
  • [2025-01-09] cmark-gfm 0.29.0.gfm.13-4 MIGRATED to testing (Debian testing watch)
  • [2025-01-06] Accepted cmark-gfm 0.29.0.gfm.13-4 (source) into unstable (Keith Packard)
  • [2025-01-06] Accepted cmark-gfm 0.29.0.gfm.13-3 (source) into unstable (Keith Packard)
  • [2025-01-05] Accepted cmark-gfm 0.29.0.gfm.13-2 (source) into unstable (Keith Packard)
  • [2025-01-05] Accepted cmark-gfm 0.29.0.gfm.13-1 (source amd64) into unstable (Debian FTP Masters) (signed by: Keith Packard)
  • [2022-12-31] cmark-gfm 0.29.0.gfm.6-6 MIGRATED to testing (Debian testing watch)
  • [2022-12-29] Accepted cmark-gfm 0.29.0.gfm.6-6 (source) into unstable (Keith Packard)
  • [2022-12-29] Accepted cmark-gfm 0.29.0.gfm.6-5 (source) into unstable (Keith Packard)
  • [2022-12-29] Accepted cmark-gfm 0.29.0.gfm.6-4 (source) into unstable (Keith Packard)
  • [2022-12-28] Accepted cmark-gfm 0.29.0.gfm.6-3 (source) into unstable (Keith Packard)
  • [2022-12-02] cmark-gfm 0.29.0.gfm.6-2.1 MIGRATED to testing (Debian testing watch)
  • [2022-11-30] Accepted cmark-gfm 0.29.0.gfm.6-2.1 (source) into unstable (Scott Talbert)
  • [2022-10-26] Accepted cmark-gfm 0.29.0.gfm.6-2 (source amd64) into unstable (Debian FTP Masters) (signed by: Keith Packard)
  • [2022-03-15] cmark-gfm 0.29.0.gfm.3-3 MIGRATED to testing (Debian testing watch)
  • [2022-03-12] Accepted cmark-gfm 0.29.0.gfm.3-3 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Keith Packard)
  • [2022-01-24] cmark-gfm 0.29.0.gfm.2-2 MIGRATED to testing (Debian testing watch)
  • [2022-01-22] Accepted cmark-gfm 0.29.0.gfm.2-2 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Keith Packard)
  • [2022-01-18] Accepted cmark-gfm 0.29.0.gfm.2-1 (source) into unstable (Keith Packard)
  • [2020-09-05] cmark-gfm 0.29.0.gfm.0-6 MIGRATED to testing (Debian testing watch)
  • [2020-09-02] Accepted cmark-gfm 0.29.0.gfm.0-6 (source) into unstable (Keith Packard)
  • [2020-08-28] Accepted cmark-gfm 0.29.0.gfm.0-5 (source) into unstable (Keith Packard)
  • [2020-03-12] cmark-gfm 0.29.0.gfm.0-4 MIGRATED to testing (Debian testing watch)
  • [2020-03-09] Accepted cmark-gfm 0.29.0.gfm.0-4 (source) into unstable (Keith Packard)
  • [2019-12-20] cmark-gfm 0.29.0.gfm.0-3 MIGRATED to testing (Debian testing watch)
  • [2019-12-17] Accepted cmark-gfm 0.29.0.gfm.0-3 (source) into unstable (Keith Packard)
  • [2019-12-17] Accepted cmark-gfm 0.29.0.gfm.0-2 (source) into unstable (Keith Packard)
  • [2019-04-22] Accepted cmark-gfm 0.29.0.gfm.0-1 (source amd64) into unstable (Keith Packard)
  • [2019-03-09] Accepted cmark-gfm 0.28.3.gfm.20-3 (source amd64) into unstable (Keith Packard)
  • [2019-03-09] Accepted cmark-gfm 0.28.3.gfm.20-2 (source amd64) into unstable (Keith Packard)
  • [2019-03-09] Accepted cmark-gfm 0.28.3.gfm.20-1 (source amd64) into unstable (Keith Packard)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.29.0.gfm.13-4
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing