{"id":"GO-2021-0238","summary":"Infinite loop when parsing inputs in golang.org/x/net/html","details":"An attacker can craft an input to ParseFragment that causes it to enter an infinite loop and never return.","aliases":["BIT-golang-2021-33194","CVE-2021-33194","GHSA-83g2-8m93-v3w7"],"modified":"2026-03-17T04:06:08.797041Z","published":"2022-02-17T17:33:43Z","related":["CGA-9272-x7px-vpxg"],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2021-0238","review_status":"REVIEWED"},"references":[{"type":"FIX","url":"https://go.dev/cl/311090"},{"type":"FIX","url":"https://go.googlesource.com/net/+/37e1c6afe02340126705deced573a85ab75209d7"},{"type":"REPORT","url":"https://go.dev/issue/46288"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/wPunbCPkWUg"}],"affected":[{"package":{"name":"golang.org/x/net","ecosystem":"Go","purl":"pkg:golang/golang.org/x/net"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.0.0-20210520170846-37e1c6afe023"}]}],"ecosystem_specific":{"imports":[{"path":"golang.org/x/net/html","symbols":["Parse","ParseFragment","ParseFragmentWithOptions","ParseWithOptions","inHeadIM"]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2021-0238.json"}}],"schema_version":"1.7.5","credits":[{"name":"OSS-Fuzz (discovery)"},{"name":"Andrew Thornton (reporter)"}]}