fix(deps): update module helm.sh/helm/v3 to v3.11.1 [security] #174
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v3.11.0
->v3.11.1
GitHub Vulnerability Alerts
CVE-2023-25165
A Helm contributor discovered an information disclosure vulnerability using the
getHostByName
template function.Impact
getHostByName
is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used withhelm install|upgrade|template
or when the Helm SDK is used to render a chart.Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject
getHostByName
into a chart in order to disclose values to a malicious DNS server.Patches
The issue has been fixed in Helm 3.11.1.
Workarounds
Prior to using a chart with Helm verify the
getHostByName
function is not being used in a template to disclose any information you do not want passed to DNS servers.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Philipp Stehle at SAP.
Release Notes
helm/helm
v3.11.1
: Helm v3.11.1Compare Source
Helm v3.11.1 is a security (patch) release. Users are strongly recommended to update to this release.
The template function
getHostByName
can be used to disclose information. More details are available in the CVE.This release introduces a breaking changes to Helm:
helm
client for thetemplate
,install
, andupgrade
commands there is a new flag.--enable-dns
needs to be set for thegetHostByName
template function to attempt to lookup an IP address for a given hostname. If the flag is not set the template function will return an empty string and skip looping up an IP address for the host.EnableDNS
property to the install action, the upgrade action, and theEngine
. This property must be set to true for the in order for thegetHostByName
template function to attempt to lookup an IP address.The default for both of these cases is false.
Philipp Stehle at SAP disclosed the vulnerability to the Helm project.
Installation and Upgrading
Download Helm v3.11.1. The common platform binaries are here:
This release was signed with
672C 657B E06B 4B30 969C 4A57 4614 49C2 5E36 B98E
and can be found at @mattfarina keybase account. Please use the attached signatures for verifying this release usinggpg
.The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash
.What's Next
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.