Source: mistune
Version: 3.1.3-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 3.1.4-1

Hi,

The following vulnerability was published for mistune.

CVE-2026-33079[0]:
| In versions 3.0.0a1 through 3.2.0 of Mistune, there is a ReDoS
| (Regular Expression Denial of Service) vulnerability in
| `LINK_TITLE_RE` that allows an attacker who can supply Markdown for
| parsing to cause denial of service. The regular expression used for
| parsing link titles contains overlapping alternatives that can
| trigger catastrophic backtracking. In both the double-quoted and
| single-quoted branches, a backslash followed by punctuation can be
| matched either as an escaped punctuation sequence or as two ordinary
| characters, creating an ambiguous pattern inside a repeated group.
| If an attacker supplies Markdown containing repeated ! sequences
| with no closing quote, the regex engine explores an exponential
| number of backtracking paths. This is reachable through normal
| Markdown parsing of inline links and block link reference
| definitions. A small crafted input can therefore cause significant
| CPU consumption and make applications using Mistune unresponsive.

Note there is no upstream fix at time of writing for this, but filling
a bug for tracking.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33079
    https://www.cve.org/CVERecord?id=CVE-2026-33079
[1] https://github.com/lepture/mistune/security/advisories/GHSA-8mp2-v27r-99xp

Regards,
Salvatore

Reply via email to