Description
The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)."
Remediation
References
https://nodesecurity.io/advisories/23
http://www.openwall.com/lists/oss-security/2016/04/20/11
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
Related Vulnerabilities
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-common
CVE-2020-8203 Vulnerability in npm package lodash
CVE-2020-7766 Vulnerability in npm package json-ptr
CVE-2023-46604 Vulnerability in maven package org.apache.activemq:activemq-client
CVE-2018-14718 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind