Bug 2271609 (CVE-2024-28243)

Summary: CVE-2024-28243 katex: malicious input using `\edef` that causes a near-infinite loop
Product: [Other] Security Response Reporter: Rohit Keshri <rkeshri>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2271610, 2271611    
Bug Blocks:    

Description Rohit Keshri 2024-03-26 14:06:42 UTC
KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions could encounter malicious input using `\edef` that causes a near-infinite loop, despite setting `maxExpand` to avoid such loops. This can be used as an availability attack, where e.g. a client rendering another user's KaTeX input will be unable to use the site due to memory overflow, tying up the main thread, or stack overflow. Upgrade to KaTeX v0.16.10 to remove this vulnerability.

https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34
https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w

Comment 1 Rohit Keshri 2024-03-26 14:07:05 UTC
Created h3 tracking bugs for this issue:

Affects: fedora-all [bug 2271610]


Created marker tracking bugs for this issue:

Affects: fedora-all [bug 2271611]