-
Notifications
You must be signed in to change notification settings - Fork 3
fix(deps): update module helm.sh/helm/v3 to v3.18.5 [security] #90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/go-helm.sh-helm-v3-vulnerability
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Author
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
109ea80 to
5c3fa6b
Compare
5c3fa6b to
bc3afb8
Compare
bc3afb8 to
68ffbbc
Compare
68ffbbc to
1b8a648
Compare
1b8a648 to
872f37d
Compare
010be3c to
4afddc3
Compare
4afddc3 to
5ddddea
Compare
5ddddea to
2bf8038
Compare
2bf8038 to
2470565
Compare
2470565 to
2c1f2ad
Compare
2c1f2ad to
c503f65
Compare
Author
ℹ️ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v3.7.1→v3.18.5Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2022-36055
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the
_strvals_package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the_strvals_package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.Impact
The
_strvals_package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like--set,--set-string, and others that enable the user to pass in strings that are merged into the values. The_strvals_package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.Applications that use the
_strvals_package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.The Helm Client will panic with input to
--set,--set-string, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.Patches
This issue has been resolved in 3.9.4.
Workarounds
SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the
_strvals_functions.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
CVE-2022-23524
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the strvals package that can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the strvals package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.
Impact
The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like
--set,--set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing a stack overflow.Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.
The Helm Client will panic with input to
--set,--set-string, and other value setting flags that causes a stack overflow. Helm is not a long running service so the panic will not affect future uses of the Helm client.Patches
This issue has been resolved in 3.10.3.
Workarounds
SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the strvals functions.
For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
CVE-2023-25165
A Helm contributor discovered an information disclosure vulnerability using the
getHostByNametemplate function.Impact
getHostByNameis a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used withhelm install|upgrade|templateor when the Helm SDK is used to render a chart.Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject
getHostByNameinto a chart in order to disclose values to a malicious DNS server.Patches
The issue has been fixed in Helm 3.11.1.
Workarounds
Prior to using a chart with Helm verify the
getHostByNamefunction is not being used in a template to disclose any information you do not want passed to DNS servers.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Philipp Stehle at SAP.
CVE-2022-23525
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the
_repo_package that can cause a segmentation violation. Applications that use functions from the_repo_package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.Impact
The
_repo_package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The_repo_package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation.Applications that use the
_repo_package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.
Patches
This issue has been resolved in 3.10.3.
Workarounds
SDK users can validate index files that are correctly formatted before passing them to the
_repo_functions.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
CVE-2022-23526
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the
_chartutil_package that can cause a segmentation violation. Applications that use functions from the_chartutil_package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.Impact
The
_chartutil_package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The_chartutil_package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation.Applications that use the
_chartutil_package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.The Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.
Patches
This issue has been resolved in 3.10.3.
Workarounds
SDK users can validate schema files that are correctly formatted before passing them to the
_chartutil_functions.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
CVE-2024-25620
A Helm contributor discovered a path traversal vulnerability when Helm saves a chart including at download time.
Impact
When either the Helm client or SDK is used to save a chart whose name within the
Chart.yamlfile includes a relative path change, the chart would be saved outside its expected directory based on the changes in the relative path. The validation and linting did not detect the path changes in the name.Patches
This issue has been resolved in Helm v3.14.1.
Workarounds
Check all charts used by Helm for path changes in their name as found in the
Chart.yamlfile. This includes dependencies.Credits
Disclosed by Dominykas Blyžė at Nearform Ltd.
CVE-2024-26147
A Helm contributor discovered uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content.
Impact
When either an
index.yamlfile or a pluginsplugin.yamlfile were missing all metadata a panic would occur in Helm.In the Helm SDK this is found when using the
LoadIndexFileorDownloadIndexFilefunctions in therepopackage or theLoadDirfunction in thepluginpackage. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation.Patches
This issue has been resolved in Helm v3.14.2.
Workarounds
If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem.
If using Helm SDK versions prior to 3.14.2, calls to affected functions can use
recoverto catch the panic.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
CVE-2025-32386
A Helm contributor discovered that a specially crafted chart archive file can cause Helm to use all available memory and have an out of memory (OOM) termination.
Impact
A chart archive file can be crafted in a manner where it expands to be significantly larger uncompressed than compressed (e.g., >800x difference). When Helm loads this specially crafted chart, memory can be exhausted causing the application to terminate.
Patches
This issue has been resolved in Helm v3.17.3.
Workarounds
Ensure that any chart archive files being loaded by Helm do not contain files that are large enough to cause the Helm Client or SDK to use up available memory leading to a termination.
For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
CVE-2025-32387
A Helm contributor discovered that a specially crafted JSON Schema within a chart can lead to a stack overflow.
Impact
A JSON Schema file within a chart can be crafted with a deeply nested chain of references, leading to parser recursion that can exceed the stack size limit and trigger a stack overflow.
Patches
This issue has been resolved in Helm v3.17.3.
Workarounds
Ensure that the JSON Schema within any charts loaded by Helm does not have a large number of nested references. These JSON Schema files are larger than 10 MiB.
For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
CVE-2025-53547
A Helm contributor discovered that a specially crafted
Chart.yamlfile along with a specially linkedChart.lockfile can lead to local code execution when dependencies are updated.Impact
Fields in a
Chart.yamlfile, that are carried over to aChart.lockfile when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., abash.rcfile or shell script). If theChart.lockfile is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking.This affects when dependencies are updated. When using the
helmcommand this happens whenhelm dependency updateis run.helm dependency buildcan write a lock file when one does not exist but this vector requires one to already exist. This affects the Helm SDK when the downloaderManagerperforms an update.Patches
This issue has been resolved in Helm v3.18.4
Workarounds
Ensure the
Chart.lockfile in a chart is not a symlink prior to updating dependencies.For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
CVE-2025-55199
A Helm contributor discovered that it was possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination.
Impact
A malicious chart can point
$refin values.schema.json to a device (e.g./dev/*) or other problem file which could cause Helm to use all available memory and have an out of memory (OOM) termination.Patches
This issue has been resolved in Helm v3.18.5.
Workarounds
Make sure that all Helm charts that are being loaded into Helm doesn't have any reference of
$refpointing to/dev/zero.References
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
CVE-2025-55198
A Helm contributor discovered an improper validation of type error when parsing Chart.yaml and index.yaml files that can lead to a panic.
Impact
There are two areas of YAML validation that were impacted. First, when a
Chart.yamlfile had anullmaintainer or thechildorparentof a dependenciesimport-valuescould be parsed as something other than a string,helm lintwould panic. Second, when anindex.yamlhad an empty entry in the list of chart versions Helm would panic on interactions with that repository.Patches
This issue has been resolved in Helm v3.18.5.
Workarounds
Ensure YAML files are formatted as Helm expects prior to processing them with Helm.
References
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Jakub Ciolek at AlphaSense.
Release Notes
helm/helm (helm.sh/helm/v3)
v3.18.5: Helm v3.18.5Compare Source
Helm v3.18.5 is a security release. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
Security Advisories
Installation and Upgrading
Download Helm v3.18.5. The common platform binaries are here:
The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
Changelog
7799b48(Matt Farina)dd8502f(Matt Farina)cb8595b(Robert Sirchia)v3.18.4: Helm v3.18.4Compare Source
Helm v3.18.4 is a security release. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
Security Advisories
Installation and Upgrading
Download Helm v3.18.4. The common platform binaries are here:
The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
Changelog
f20a4ad(Matt Farina)563b094(dependabot[bot])00de613(Matt Farina)v3.18.3: Helm 3.18.3Compare Source
Helm v3.18.3 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
Installation and Upgrading
Download Helm v3.18.3. The common platform binaries are here:
This release was signed with
672C 657B E06B 4B30 969C 4A57 4614 49C2 5E36 B98Eand can be found at @mattfarina keybase account. Please use the attached signatures for verifying this release usinggpg.The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
Changelog
6838ebc(dependabot[bot])5b9e2f6(Terry Howe)2782412(Terry Howe)e66cf6a(Terry Howe)191f05c(Terry Howe)v3.18.2: Helm 3.18.2Compare Source
Helm v3.18.2 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
Installation and Upgrading
Download Helm v3.18.2. The common platform binaries are here:
This release was signed with
672C 657B E06B 4B30 969C 4A57 4614 49C2 5E36 B98Eand can be found at @mattfarina keybase account. Please use the attached signatures for verifying this release usinggpg.The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
Changelog
04cad46(Terry Howe)bc9f8a2(Matt Farina)v3.18.1: Helm v3.18.1Compare Source
Helm v3.18.1 is a patch release. Users are encouraged to upgrade for the best experience. Users are encouraged to upgrade for the best experience.
Notes:
The community keeps growing, and we'd love to see you there!
Installation and Upgrading
Download Helm v3.18.1. The common platform binaries are here:
The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
Changelog
f6f8700(Brandt Keller)4da7015(Brandt Keller)1a8507f(Brandt Keller)015531c(Benoit Tigeot)9db1a12(Benoit Tigeot)e8bfa0e(Benoit Tigeot)24b4490(Benoit Tigeot)7e8f534(Benoit Tigeot)ea04cea(Scott Rigby)bec6609(Matt Farina)v3.18.0: Helm v3.18.0Compare Source
Helm v3.18.0 is a feature release. Users are encouraged to upgrade for the best experience.
The community keeps growing, and we'd love to see you there!
Notable Changes
Installation and Upgrading
Download Helm v3.18.0. The common platform binaries are here:
The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with
bash.What's Next
Changelog
cc58e3f(dependabot[bot])bf1436b(Matthieu MOREL)d8edc2a(Robert Sirchia)48377fe(Rongrong Liu)cdd7c10(Terry Howe)f9ab8f7(Benoit Tigeot)087fa18(Benoit Tigeot)2a5f83b(dongjiang)5df2f30(dependabot[bot])0906fe7(Evans Mungai)4ee3a19(Patrick Seidensal)3538c2a(dependabot[bot])6fa95c8(dependabot[bot])741b5be(dependabot[bot])017f9fa(Benoit Tigeot)6667252(Benoit Tigeot)4ad1ccd(Benoit Tigeot)3ce10e4(Matt Farina)422c58e(Benoit Tigeot)5e7f12d(Benoit Tigeot)dcc286c(dependabot[bot])1435ec7(Terry Howe)674e882(Terry Howe)c188441(Terry Howe)2b12490(Matt Farina)0648918(dependabot[bot])0911b9c(dependabot[bot])2f22d55(dependabot[bot])89361c9(dependabot[bot])6d64160(dependabot[bot])bcb83e4(Scott Rigby)2aa90b8(Chris Berry)5739197(Chris Berry)b8e1387(Chris Berry)97b0e11(Scott Rigby)2f79afb(Scott Rigby)c77f4ec(Scott Rigby)3cd6afe(Scott Rigby)5367001(Chris Berry)3c44515(Chris Berry)4cb639e(Chris Berry)20f859c(Chris)ca90972(Chris Berry)a9e2075(Evans Mungai)996ad84(Evans Mungai)867c97e(Evans Mungai)af24101(Evans Mungai)c7dfa87(Evans Mungai)b39411a(Evans Mungai)4c50f01(Evans Mungai)3b43f7b(Evans Mungai)a32e11b(Evans Mungai)483ebf9(Evans Mungai)461197f(Evans Mungai)e7fa545(dependabot[bot])d1687ba(dependabot[bot])4c2f88b(Matt Farina)a2413aa(dependabot[bot])959d643(dependabot[bot])3a87c68(dependabot[bot])711cef8(dependabot[bot])7680623(dependabot[bot])03747d9(dependabot[bot])f1db83f(dependabot[bot])3bc3751(dependabot[bot])2ebce78(Jiasheng Zhu)8e86e76(dependabot[bot])326c1e3(Ryan Hockstad)fba9d08(Matt Farina)a79be7d(dependabot[bot])b029d74(dependabot[bot])a1c0ae8(dependabot[bot])d6db69e(Matt Farina)54ffefb(dependabot[bot])ef2eb55(Ryan Hockstad)60fcce1(Scott Rigby)83dddb1(Andrew Block)0a6834f(Althaf M)5a58751(Ryan Hockstad)v3.17.4: Helm v3.17.4Compare Source
Helm v3.17.4 is a patch release, this bring is the security release noted below. This is intended for Helm SDK users. CLI users are recommended to use the latest version of Helm.
Security Advisories
GHSA-557j-xg8c-q2mm: Chart Dependency Updating With Malicious Chart.yaml Content And Symlink
The community keeps growing, and we'd love to see you there!
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.