Bug 2154196 (CVE-2022-23526)

Summary: CVE-2022-23526 helm: Denial of service through schema file
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aazores, abenaiss, adudiak, amackenz, amasferr, bcoca, bkundu, chazlett, davidn, dfreiber, eaguilar, ebaron, epacific, gparvin, jburrell, jcammara, jchui, jhardy, jkang, jneedle, jobarker, jpallich, jwendell, jwon, kshier, lball, mabashia, matzew, mkudlej, njean, ocs-bugs, osapryki, owatkins, pahickey, pjindal, rcernich, rhuss, rogbas, sfroberg, simaishi, smcdonal, stcannon, teagle, tfister, tjochec, tnielsen, twalsh, vkumar, yguenane, zsadeh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: helm.sh/helm/v3 3.10.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Helm, a tool for managing Charts, a pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the_chartutil_ package that could cause a segmentation violation. The _chartutil_ package contains a parser that loads a JSON Schema validation files into structures Go can work with. Some schema files can cause array data structures to be created, causing a memory violation. Applications that use the _chartutil_ package in the Helm SDK to parse a schema files may result in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-18 04:32:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2155938, 2155941, 2157899    
Bug Blocks: 2154131    

Description Avinash Hanwate 2022-12-16 09:27:51 UTC
Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the_chartutil_ package that can cause a segmentation violation. The _chartutil_ package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The _chartutil_ package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation. Applications that use the _chartutil_ package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been patched in 3.10.3. SDK users can validate schema files that are correctly formatted before passing them to the _chartutil_ functions.

https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33
https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d

Comment 3 Anten Skrabec 2022-12-23 00:27:30 UTC
Created golang-helm-3 tracking bugs for this issue:

Affects: fedora-all [bug 2155938]

Comment 22 errata-xmlrpc 2023-04-11 07:54:57 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2023:1646 https://access.redhat.com/errata/RHSA-2023:1646

Comment 24 errata-xmlrpc 2023-05-17 22:31:09 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.13

Via RHSA-2023:1326 https://access.redhat.com/errata/RHSA-2023:1326

Comment 25 Product Security DevOps Team 2023-05-18 04:32:32 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-23526

Comment 26 errata-xmlrpc 2023-10-31 12:54:21 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.14

Via RHSA-2023:5006 https://access.redhat.com/errata/RHSA-2023:5006