billmcchesney1 / linkerd2

Ultralight, security-first service mesh for Kubernetes. Main repo for Linkerd 2.x.
https://linkerd.io
Apache License 2.0
0 stars 0 forks source link

CVE-2022-23525 (Medium) detected in helm.sh/helm/v3-v3.4.1 #101

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago

CVE-2022-23525 - Medium Severity Vulnerability

Vulnerable Library - helm.sh/helm/v3-v3.4.1

The Kubernetes Package Manager

Library home page: https://proxy.golang.org/helm.sh/helm/v3/@v/v3.4.1.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/helm.sh/helm/v3/@v/v3.4.1.mod

Dependency Hierarchy: - :x: **helm.sh/helm/v3-v3.4.1** (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the _repo_package. The _repo_ package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The _repo_ package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation. Applications that use the _repo_ package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been patched in 3.10.3. SDK users can validate index files that are correctly formatted before passing them to the _repo_ functions.

Publish Date: 2022-12-15

URL: CVE-2022-23525

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2022-23525

Release Date: 2022-12-15

Fix Resolution: v3.10.3


mend-for-github-com[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

mend-for-github-com[bot] commented 11 months ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.