{ "schema_version": "1.4.0", "id": "GHSA-636f-xm5j-pj9m", "modified": "2023-01-24T18:12:17Z", "published": "2023-01-24T18:12:17Z", "aliases": [], "summary": "Several quadratic complexity bugs may lead to denial of service in Commonmarker", "details": "## Impact\n\nSeveral quadratic complexity bugs in commonmarker's underlying [`cmark-gfm`](https://github.com/github/cmark-gfm) library may lead to unbounded resource exhaustion and subsequent denial of service.\n\nThe following vulnerabilities were addressed:\n\n* [CVE-2023-22483](https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c)\n* [CVE-2023-22484](https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r)\n* [CVE-2023-22485](https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr)\n* [CVE-2023-22486](https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p)\n\nFor more information, consult the release notes for version [`0.23.0.gfm.7`](https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.7).\n\n## Mitigation\n\nUsers are advised to upgrade to commonmarker version [`0.23.7`](https://rubygems.org/gems/commonmarker/versions/0.23.7).", "severity": [], "affected": [ { "package": { "ecosystem": "RubyGems", "name": "commonmarker" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.23.7" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-636f-xm5j-pj9m" }, { "type": "PACKAGE", "url": "https://github.com/gjtorikian/commonmarker" } ], "database_specific": { "cwe_ids": [ "CWE-400" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-01-24T18:12:17Z", "nvd_published_at": null } }