First published: Wed Sep 07 2022(Updated: )
Flux2 is a tool for keeping Kubernetes clusters in sync with sources of configuration, and Flux's helm-controller is a Kubernetes operator that allows one to declaratively manage Helm chart releases. Helm controller is tightly integrated with the Helm SDK. A vulnerability found in the Helm SDK that affects flux2 v0.0.17 until v0.32.0 and helm-controller v0.0.4 until v0.23.0 allows for specific data inputs to cause high memory consumption. In some platforms, this could cause the controller to panic and stop processing reconciliations. In a shared cluster multi-tenancy environment, a tenant could create a HelmRelease that makes the controller panic, denying all other tenants from their Helm releases being reconciled. Patches are available in flux2 v0.32.0 and helm-controller v0.23.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Helm Helm | >=3.0.0<3.9.4 | |
Fluxcd Flux2 | >=0.0.17<0.32.0 | |
Fluxcd Helm-controller | >=0.0.4<0.23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36049 is a vulnerability found in the Helm SDK that affects Helm, Flux2, and the Helm-controller.
CVE-2022-36049 has a severity score of 7.5, which is considered high.
CVE-2022-36049 affects Helm, Flux2, and the Helm-controller.
To fix CVE-2022-36049, it is recommended to update Helm to version 3.9.4 or higher, Flux2 to version 0.32.0 or higher, and Helm-controller to version 0.23.0 or higher.
You can find more information about CVE-2022-36049 at the following references: [Reference 1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=44996), [Reference 2](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48360), [Reference 3](https://github.com/fluxcd/flux2/security/advisories/GHSA-p2g7-xwvr-rrw3)