You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- introduced: TODO (earliest fixed "3.10.3", vuln range "<= 3.10.2")
packages:
- package: helm.sh/helm/v3
description: "Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input
to functions in the _strvals_ package that can cause a stack overflow. In Go,
a stack overflow cannot be recovered from. Applications that use functions from
the _strvals_ package in the Helm SDK can have a Denial of Service attack when
they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains
a parser that turns strings into Go structures. For example, the Helm client has
command line flags like `--set`, `--set-string`, and others that enable the user
to pass in strings that are merged into the values. The _strvals_ package converts
these strings into structures Go can work with. Some string inputs can cause array
data structures to be created causing a stack overflow.\n\nApplications that use
the _strvals_ package in the Helm SDK to parse user supplied input can suffer
a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe
Helm Client will panic with input to `--set`, `--set-string`, and other value
setting flags that causes a stack overflow. Helm is not a long running service
so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis
issue has been resolved in 3.10.3. \n\n### Workarounds\n\nSDK users can validate
strings supplied by users won't create large arrays causing significant memory
usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm's
security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md)
document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored
by CNCF."
cves:
- CVE-2022-23524
ghsas:
- GHSA-6rx9-889q-vv2r
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-6rx9-889q-vv2r, there is a vulnerability in the following Go packages or modules:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: