CVE-2022-36055 – helm.sh/helm/v3
Package
Manager: go
Name: helm.sh/helm/v3
Vulnerable Version: >=0 <3.9.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00058 pctl0.18239
Details
Helm Vulnerable to denial of service through string value parsing Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_strvals_` package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the `_strvals_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. ### Impact The `_strvals_` package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The `_strvals_` package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the `_strvals_` package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. ### Patches This issue has been resolved in 3.9.4. ### Workarounds SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the `_strvals_` functions. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document. ### Credits Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
Metadata
Created: 2022-08-30T20:52:31Z
Modified: 2023-08-30T18:43:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-7hfp-qfw3-5jxh/GHSA-7hfp-qfw3-5jxh.json
CWE IDs: ["CWE-400", "CWE-770"]
Alternative ID: GHSA-7hfp-qfw3-5jxh
Finding: F067
Auto approve: 1