Bug 2123821 (CVE-2022-36055) - CVE-2022-36055 helm: memory panic
Summary: CVE-2022-36055 helm: memory panic
Status: NEW
Alias: CVE-2022-36055
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 2124211 2124212 2129943
Blocks: 2123822
TreeView+ depends on / blocked
Reported: 2022-09-02 17:31 UTC by Sage McTaggart
Modified: 2022-11-07 14:33 UTC (History)
21 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An out-of-memory panic vulnerability exists in the strvals package, which can lead to a denial of service. Applications that use functions from the strvals package in the Helm SDK can cause panic and denial of service.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Sage McTaggart 2022-09-02 17:31:45 UTC
Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.


Note You need to log in before you can comment on or make changes to this bug.