GO-2022-1165

Source
https://pkg.go.dev/vuln/GO-2022-1165
Import Source
https://vuln.go.dev/ID/GO-2022-1165.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-1165
Aliases
Published
2022-12-22T23:11:46Z
Modified
2024-05-20T16:03:47Z
Summary
Denial of service via repository index file in helm.sh/helm/v3
Details

Applications that use the repo package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.

The repo package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The repo package parses the index file of the repository and loads it into memory. Some index files can cause array data structures to be created causing a memory violation.

The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.

References
Credits
    • Ada Logics, in a fuzzing audit sponsored by CNCF

Affected packages

Go / helm.sh/helm/v3

Package

Name
helm.sh/helm/v3
View open source insights on deps.dev
Purl
pkg:golang/helm.sh/helm/v3

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.10.3

Ecosystem specific

{
    "imports": [
        {
            "path": "helm.sh/helm/v3/pkg/repo",
            "symbols": [
                "ChartRepository.DownloadIndexFile",
                "ChartRepository.Index",
                "ChartRepository.Load",
                "File.Remove",
                "FindChartInAuthAndTLSAndPassRepoURL",
                "FindChartInAuthAndTLSRepoURL",
                "FindChartInAuthRepoURL",
                "FindChartInRepoURL",
                "IndexDirectory",
                "IndexFile.Add",
                "IndexFile.MustAdd",
                "LoadIndexFile",
                "loadIndex"
            ]
        }
    ]
}