GO-2021-0238

Source
https://pkg.go.dev/vuln/GO-2021-0238
Import Source
https://vuln.go.dev/ID/GO-2021-0238.json
JSON Data
https://api.test.osv.dev/v1/vulns/GO-2021-0238
Aliases
Published
2022-02-17T17:33:43Z
Modified
2024-09-11T06:12:23.080746Z
Summary
Infinite loop when parsing inputs in golang.org/x/net/html
Details

An attacker can craft an input to ParseFragment that causes it to enter an infinite loop and never return.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2021-0238"
}
References
Credits
    • OSS-Fuzz (discovery)
    • Andrew Thornton (reporter)

Affected packages

Go / golang.org/x/net

Package

Name
golang.org/x/net
View open source insights on deps.dev
Purl
pkg:golang/golang.org/x/net

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20210520170846-37e1c6afe023

Ecosystem specific

{
    "imports": [
        {
            "path": "golang.org/x/net/html",
            "symbols": [
                "Parse",
                "ParseFragment",
                "ParseFragmentWithOptions",
                "ParseWithOptions",
                "inHeadIM"
            ]
        }
    ]
}