logo

CVE-2022-23525 helm.sh/helm/v3

Package

Manager: go
Name: helm.sh/helm/v3
Vulnerable Version: >=0 <3.10.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00029 pctl0.06779

Details

Helm vulnerable to denial of service through through repository index file Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_repo_` package that can cause a segmentation violation. Applications that use functions from the `_repo_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. ### Impact The `_repo_` package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The `_repo_` package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation. Applications that use the `_repo_` package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. ### Patches This issue has been resolved in 3.10.3. ### Workarounds SDK users can validate index files that are correctly formatted before passing them to the `_repo_` functions. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.

Metadata

Created: 2022-12-14T21:38:31Z
Modified: 2023-08-30T18:40:46Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-53c4-hhmh-vw5q/GHSA-53c4-hhmh-vw5q.json
CWE IDs: ["CWE-476"]
Alternative ID: GHSA-53c4-hhmh-vw5q
Finding: F002
Auto approve: 1