Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: katex

Found 1 matching suggestions

View:
Compact
Detailed
Dismissed
Permalink CVE-2024-28243
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • mdbook-katex
    • pandoc-katex
    • nodePackages.katex
    • nodePackages_latest.katex
    • python312Packages.sphinxcontrib-katex
    • python313Packages.sphinxcontrib-katex
    • python314Packages.sphinxcontrib-katex
  • @LeSuisse dismissed
KaTeX's maxExpand bypassed by \edef

KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions could encounter malicious input using `\edef` that causes a near-infinite loop, despite setting `maxExpand` to avoid such loops. This can be used as an availability attack, where e.g. a client rendering another user's KaTeX input will be unable to use the site due to memory overflow, tying up the main thread, or stack overflow. Upgrade to KaTeX v0.16.10 to remove this vulnerability.

Affected products

KaTeX
  • ==>= v0.10.0-beta, < 0.16.10
  • ==>= 0.12.0, < 0.16.10

Matching in nixpkgs

Package maintainers

Current stable was never impacted.

https://github.com/NixOS/nixpkgs/commit/e99bf3b9616ba34ba15c46c32cc72573dfbf3484