CVE-2023-42821 : github.com/gomarkdown/markdown parsing malformed markdown #1335
Labels
kind/bug
Categorizes issue or PR as related to a bug.
triage/accepted
Indicates an issue or PR is ready to be actively worked on.
What happened: Parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability.
NIST rating medium
What you expected to happen:
Anything else we need to know?:
To exploit the vulnerability, parser needs to have parser.Mmark extension set. The panic occurs inside the citation.go file on the line 69 when the parser tries to access the element past its length.
https://github.com/gomarkdown/markdown/blob/7478c230c7cd3e7328803d89abe591d0b61c41e4/parser/citation.go#L69
Environment:
Kubernetes distribution (GKE, EKS, Kubeadm, the hard way, etc.):
Container Network Setup (flannel, calico, etc.):
Kubernetes version (use
kubectl version
): 1.23 -1.28Metrics Server Version: v0.6.4
Metrics Server manifest
spoiler for Metrics Server manifest:
spoiler for Kubelet config:
spoiler for Metrics Server logs:
spolier for Status of Metrics API:
/kind bug
The text was updated successfully, but these errors were encountered: