CVE-2021-26813: markdown2 Regular Expression Denial of Service
(updated )
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
References
- github.com/advisories/GHSA-jr9p-r423-9m2r
- github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2021-20.yaml
- github.com/trentm/python-markdown2
- github.com/trentm/python-markdown2/commit/7b651260739647de5198323e0445b1618750c374
- github.com/trentm/python-markdown2/pull/387
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRP5RN35JZTSJ3JT4722F447ZDK7LZS5
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J752422YELXLMLZJPVJVKD2KKHHQRVEH
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTIX5UXRDJZJ57DO4V33ZNJTNKWGBQLY
- nvd.nist.gov/vuln/detail/CVE-2021-26813
Detect and mitigate CVE-2021-26813 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →