Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in helm.sh/helm/v3: GHSA-67fx-wx78-jx33 #1166

Closed
GoVulnBot opened this issue Dec 14, 2022 · 1 comment
Closed
Assignees

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-67fx-wx78-jx33, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
helm.sh/helm/v3 3.10.3 <= 3.10.2

Cross references:
No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - introduced: TODO (earliest fixed "3.10.3", vuln range "<= 3.10.2")
    packages:
      - package: helm.sh/helm/v3
description: "Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input
    to functions in the _chartutil_ package that can cause a segmentation violation.
    Applications that use functions from the _chartutil_ package in the Helm SDK can
    have a Denial of Service attack when they use this package and it panics.\n\n###
    Impact\n\nThe _chartutil_ package contains a parser that loads a JSON Schema validation
    file. For example, the Helm client when rendering a chart will validate its values
    with the schema file. The _chartutil_ package parses the schema file and loads
    it into structures Go can work with. Some schema files can cause array data structures
    to be created causing a memory violation.\n\nApplications that use the _chartutil_
    package in the Helm SDK to parse a schema file can suffer a Denial of Service
    when that input causes a panic that cannot be recovered from.\n\nThe Helm Client
    will panic with a schema file that causes a memory violation panic. Helm is not
    a long running service so the panic will not affect future uses of the Helm client.\n\n###
    Patches\n\nThis issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK
    users can validate schema files that are correctly formatted before passing them
    to the _chartutil_ functions.\n\n### For more information\n\nHelm's security policy
    is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md)
    document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored
    by CNCF."
cves:
  - CVE-2022-23526
ghsas:
  - GHSA-67fx-wx78-jx33

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants