Update dependency league/commonmark to v2.6.0 [SECURITY] - autoclosed #63
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.5.3
->2.6.0
GitHub Vulnerability Alerts
GHSA-c2pc-g5qf-rfrf
Impact
Several polynomial time complexity issues in league/commonmark may lead to unbounded resource exhaustion and subsequent denial of service.
Malicious users could trigger that inefficient code with carefully crafted Markdown inputs that are specifically designed to ensure the worst-case performance is reached. Sending multiple such requests in parallel could tie up all available CPU resources and/or PHP-FPM processes, leading to denial of service for legitimate users.
Patches
These vulnerabilities have been patched in version 2.6.0. All users on older versions are highly encouraged to upgrade as soon as possible.
Workarounds
If you cannot upgrade, you may be able to mitigate the issues by:
memory_limit
andmax_execution_time
PHP configurations to prevent runaway resource usageReferences
Most of these issues were discovered in other Markdown parsers. You can read more about them here:
For general information about this type of issue:
Release Notes
thephpleague/commonmark (league/commonmark)
v2.6.0
Compare Source
This is a security release to address potential denial of service attacks when parsing specially crafted,
malicious input from untrusted sources (like user input).
Added
max_delimiters_per_line
config option to prevent denial of service attacks when parsing malicious inputtable/max_autocompleted_cells
config option to prevent denial of service attacks when parsing large tablesAttributesExtension
now supports attributes without values (#985, #986)AutolinkExtension
exposes two new configuration options to override the default behavior (#969, #987):autolink/allowed_protocols
- an array of protocols to allow autolinking forautolink/default_protocol
- the default protocol to use when none is specifiedRegexHelper::isWhitespace()
method to check if a given character is an ASCII whitespace characterCacheableDelimiterProcessorInterface
to ensure linear complexity for dynamic delimiter processingBracket
delimiter type to optimize bracket parsingChanged
[
and]
are no longer added asDelimiter
objects on the stack; a newBracket
type with its own stack is used insteadUrlAutolinkParser
no longer parses URLs with more than 127 subdomainsDelimiterInterface::getIndex()
DelimiterStack
now accepts integer positions for any$stackBottom
argumentConfiguration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.