Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-36055 (GCVE-0-2022-36055)
Vulnerability from cvelistv5 – Published: 2022-09-01 12:15 – Updated: 2025-04-23 17:32- CWE-400 - Uncontrolled Resource Consumption
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T09:52:00.289Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-36055",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T14:01:38.428309Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-23T17:32:44.520Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "helm",
"vendor": "helm",
"versions": [
{
"status": "affected",
"version": "\u003c 3.9.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-01T12:15:13.000Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
}
],
"source": {
"advisory": "GHSA-7hfp-qfw3-5jxh",
"discovery": "UNKNOWN"
},
"title": "Denial of service in Helm",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-36055",
"STATE": "PUBLIC",
"TITLE": "Denial of service in Helm"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "helm",
"version": {
"version_data": [
{
"version_value": "\u003c 3.9.4"
}
]
}
}
]
},
"vendor_name": "helm"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh",
"refsource": "CONFIRM",
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
},
{
"name": "https://github.com/helm/helm/releases/tag/v3.9.4",
"refsource": "MISC",
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
}
]
},
"source": {
"advisory": "GHSA-7hfp-qfw3-5jxh",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-36055",
"datePublished": "2022-09-01T12:15:13.000Z",
"dateReserved": "2022-07-15T00:00:00.000Z",
"dateUpdated": "2025-04-23T17:32:44.520Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndExcluding\": \"3.9.4\", \"matchCriteriaId\": \"CF12F100-CF74-44E7-9CA3-587E32370849\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\"}, {\"lang\": \"es\", \"value\": \"Helm es una herramienta para administrar Charts. Los Charts son paquetes de recursos Kubernetes preconfigurados. Las pruebas Fuzz, proporcionadas por el CNCF, identificaron la entrada de funciones en el paquete _strvals_ que pueden causar un p\\u00e1nico de memoria. El paquete _strvals_ contiene un analizador que convierte las cadenas en estructuras Go. El paquete _strvals_ convierte estas cadenas en estructuras con las que Go puede trabajar. Algunas entradas de cadenas pueden causar la creaci\\u00f3n de estructuras de datos de array causando un p\\u00e1nico de memoria. Las aplicaciones que usan el paquete _strvals_ en el SDK de Helm para analizar la entrada suministrada por el usuario pueden sufrir una Denegaci\\u00f3n de Servicio cuando esa entrada causa un p\\u00e1nico del que no puede recuperarse. El cliente de Helm entrar\\u00e1 en p\\u00e1nico con la entrada de \\\"--set\\\", \\\"--set-string\\\", y otros flags de configuraci\\u00f3n de valores que causan un p\\u00e1nico de memoria. Helm no es un servicio de larga duraci\\u00f3n, por lo que el p\\u00e1nico no afectar\\u00e1 a futuros usos del cliente Helm. Este problema ha sido resuelto en versi\\u00f3n 3.9.4. Los usuarios del SDK pueden comprender que las cadenas suministradas por los usuarios no crear\\u00e1n matrices grandes que causen un uso significativo de la memoria antes de pasarlas a las funciones _strvals_\"}]",
"id": "CVE-2022-36055",
"lastModified": "2024-11-21T07:12:16.797",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2022-09-01T13:15:08.930",
"references": "[{\"url\": \"https://github.com/helm/helm/releases/tag/v3.9.4\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/helm/helm/releases/tag/v3.9.4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-36055\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-09-01T13:15:08.930\",\"lastModified\":\"2024-11-21T07:12:16.797\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\"},{\"lang\":\"es\",\"value\":\"Helm es una herramienta para administrar Charts. Los Charts son paquetes de recursos Kubernetes preconfigurados. Las pruebas Fuzz, proporcionadas por el CNCF, identificaron la entrada de funciones en el paquete _strvals_ que pueden causar un p\u00e1nico de memoria. El paquete _strvals_ contiene un analizador que convierte las cadenas en estructuras Go. El paquete _strvals_ convierte estas cadenas en estructuras con las que Go puede trabajar. Algunas entradas de cadenas pueden causar la creaci\u00f3n de estructuras de datos de array causando un p\u00e1nico de memoria. Las aplicaciones que usan el paquete _strvals_ en el SDK de Helm para analizar la entrada suministrada por el usuario pueden sufrir una Denegaci\u00f3n de Servicio cuando esa entrada causa un p\u00e1nico del que no puede recuperarse. El cliente de Helm entrar\u00e1 en p\u00e1nico con la entrada de \\\"--set\\\", \\\"--set-string\\\", y otros flags de configuraci\u00f3n de valores que causan un p\u00e1nico de memoria. Helm no es un servicio de larga duraci\u00f3n, por lo que el p\u00e1nico no afectar\u00e1 a futuros usos del cliente Helm. Este problema ha sido resuelto en versi\u00f3n 3.9.4. Los usuarios del SDK pueden comprender que las cadenas suministradas por los usuarios no crear\u00e1n matrices grandes que causen un uso significativo de la memoria antes de pasarlas a las funciones _strvals_\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"CF12F100-CF74-44E7-9CA3-587E32370849\"}]}]}],\"references\":[{\"url\":\"https://github.com/helm/helm/releases/tag/v3.9.4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/helm/helm/releases/tag/v3.9.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/helm/helm/releases/tag/v3.9.4\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T09:52:00.289Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-36055\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T14:01:38.428309Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-23T14:01:39.720Z\"}}], \"cna\": {\"title\": \"Denial of service in Helm\", \"source\": {\"advisory\": \"GHSA-7hfp-qfw3-5jxh\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"helm\", \"product\": \"helm\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 3.9.4\"}]}], \"references\": [{\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/helm/helm/releases/tag/v3.9.4\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2022-09-01T12:15:13.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, \"source\": {\"advisory\": \"GHSA-7hfp-qfw3-5jxh\", \"discovery\": \"UNKNOWN\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"\u003c 3.9.4\"}]}, \"product_name\": \"helm\"}]}, \"vendor_name\": \"helm\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\", \"name\": \"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://github.com/helm/helm/releases/tag/v3.9.4\", \"name\": \"https://github.com/helm/helm/releases/tag/v3.9.4\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-400: Uncontrolled Resource Consumption\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-36055\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Denial of service in Helm\", \"ASSIGNER\": \"security-advisories@github.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-36055\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-23T17:32:44.520Z\", \"dateReserved\": \"2022-07-15T00:00:00.000Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2022-09-01T12:15:13.000Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-7HFP-QFW3-5JXH
Vulnerability from github – Published: 2022-08-30 20:52 – Updated: 2023-08-30 18:43Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.
Impact
The _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.
Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.
The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.
Patches
This issue has been resolved in 3.9.4.
Workarounds
SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.
For more information
Helm's security policy is spelled out in detail in our SECURITY document.
Credits
Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "helm.sh/helm/v3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.9.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-36055"
],
"database_specific": {
"cwe_ids": [
"CWE-400",
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2022-08-30T20:52:31Z",
"nvd_published_at": "2022-09-01T13:15:00Z",
"severity": "MODERATE"
},
"details": "Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_strvals_` package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the `_strvals_` package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe `_strvals_` package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The `_strvals_` package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.\n\nApplications that use the `_strvals_` package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.9.4. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the `_strvals_` functions.\n\n### For more information\n\nHelm\u0027s security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.",
"id": "GHSA-7hfp-qfw3-5jxh",
"modified": "2023-08-30T18:43:09Z",
"published": "2022-08-30T20:52:31Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36055"
},
{
"type": "WEB",
"url": "https://github.com/helm/helm/commit/10466e3e179cc8cad4b0bb451108d3c442c69fbc"
},
{
"type": "PACKAGE",
"url": "https://github.com/helm/helm"
},
{
"type": "WEB",
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2022-0962"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Helm Vulnerable to denial of service through string value parsing"
}
SUSE-SU-2022:3666-1
Vulnerability from csaf_suse - Published: 2022-10-19 18:45 - Updated: 2022-10-19 18:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for helm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for helm fixes the following issues:\n\nhelm was updated to version 3.9.4:\n\n* CVE-2022-36055: Fixed denial of service through string value parsing (bsc#1203054).\n* Updating the certificates used for testing\n* Updating index handling\n\nhelm was updated to version 3.9.3:\n\n- CVE-2022-1996: Updated kube-openapi to fix an issue that could result in a CORS protection bypass (bsc#1200528).\n* Fix missing array length check on release\n\nhelm was updated to version 3.9.2:\n\n* Update of the circleci image\n\nhelm was updated to version 3.9.1:\n\n* Update to support Kubernetes 1.24.2\n* Improve logging and safety of statefulSetReady\n* Make token caching an opt-in feature\n* Bump github.com/lib/pq from 1.10.5 to 1.10.6\n* Bump github.com/Masterminds/squirrel from 1.5.2 to 1.5.3\n\nhelm was updated to version 3.9.0:\n\n* Added a --quiet flag to helm lint\n* Added a --post-renderer-args flag to support arguments being passed to the post renderer\n* Added more checks during the signing process\n* Updated to add Kubernetes 1.24 support\n\nhelm was updated to version 3.8.2:\n\n* Bump oras.land/oras-go from 1.1.0 to 1.1.1\n* Fixing downloader plugin error handling\n* Simplify testdata charts\n* Simplify testdata charts\n* Add tests for multi-level dependencies.\n* Fix value precedence\n* Bumping Kubernetes package versions\n* Updating vcs to latest version\n* Dont modify provided transport\n* Pass http getter as pointer in tests\n* Add docs block\n* Add transport option and tests\n* Reuse http transport\n* Updating Kubernetes libs to 0.23.4 (latest)\n* fix: remove deadcode\n* fix: helm package tests\n* fix: helm package with dependency update for charts with OCI dependencies\n* Fix typo Unset the env var before func return in Unit Test\n* add legal name check\n* maint: fix syntax error in deploy.sh\n* linting issue fixed\n* only apply overwrite if version is canary\n* overwrite flag added to az storage blob upload-batch\n* Avoid querying for OCI tags can explicit version provided in chart dependencies\n* Management of bearer tokens for tag listing\n* Updating Kubernetes packages to 1.23.3\n* refactor: use `os.ReadDir` for lightweight directory reading\n* Add IngressClass to manifests to be (un)installed\n* feat(comp): Shell completion for OCI\n* Fix install memory/goroutine leak\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3666,SUSE-SLE-Module-Containers-15-SP3-2022-3666,SUSE-SLE-Module-Containers-15-SP4-2022-3666,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3666,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3666,openSUSE-SLE-15.3-2022-3666,openSUSE-SLE-15.4-2022-3666",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3666-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3666-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223666-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3666-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2022-October/025643.html"
},
{
"category": "self",
"summary": "SUSE Bug 1200528",
"url": "https://bugzilla.suse.com/1200528"
},
{
"category": "self",
"summary": "SUSE Bug 1203054",
"url": "https://bugzilla.suse.com/1203054"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1996 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36055 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36055/"
}
],
"title": "Security update for helm",
"tracking": {
"current_release_date": "2022-10-19T18:45:15Z",
"generator": {
"date": "2022-10-19T18:45:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3666-1",
"initial_release_date": "2022-10-19T18:45:15Z",
"revision_history": [
{
"date": "2022-10-19T18:45:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-150000.1.10.3.aarch64",
"product": {
"name": "helm-3.9.4-150000.1.10.3.aarch64",
"product_id": "helm-3.9.4-150000.1.10.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-150000.1.10.3.i586",
"product": {
"name": "helm-3.9.4-150000.1.10.3.i586",
"product_id": "helm-3.9.4-150000.1.10.3.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"product": {
"name": "helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"product_id": "helm-bash-completion-3.9.4-150000.1.10.3.noarch"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"product": {
"name": "helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"product_id": "helm-fish-completion-3.9.4-150000.1.10.3.noarch"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"product": {
"name": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"product_id": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-150000.1.10.3.ppc64le",
"product": {
"name": "helm-3.9.4-150000.1.10.3.ppc64le",
"product_id": "helm-3.9.4-150000.1.10.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-150000.1.10.3.s390x",
"product": {
"name": "helm-3.9.4-150000.1.10.3.s390x",
"product_id": "helm-3.9.4-150000.1.10.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-150000.1.10.3.x86_64",
"product": {
"name": "helm-3.9.4-150000.1.10.3.x86_64",
"product_id": "helm-3.9.4-150000.1.10.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le"
},
"product_reference": "helm-3.9.4-150000.1.10.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x"
},
"product_reference": "helm-3.9.4-150000.1.10.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-150000.1.10.3.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le"
},
"product_reference": "helm-3.9.4-150000.1.10.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x"
},
"product_reference": "helm-3.9.4-150000.1.10.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-150000.1.10.3.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-150000.1.10.3.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-150000.1.10.3.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le"
},
"product_reference": "helm-3.9.4-150000.1.10.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x"
},
"product_reference": "helm-3.9.4-150000.1.10.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-150000.1.10.3.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-150000.1.10.3.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le"
},
"product_reference": "helm-3.9.4-150000.1.10.3.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x"
},
"product_reference": "helm-3.9.4-150000.1.10.3.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-150000.1.10.3.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64"
},
"product_reference": "helm-3.9.4-150000.1.10.3.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-150000.1.10.3.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-150000.1.10.3.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
},
"product_reference": "helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1996"
}
],
"notes": [
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1996",
"url": "https://www.suse.com/security/cve/CVE-2022-1996"
},
{
"category": "external",
"summary": "SUSE Bug 1200528 for CVE-2022-1996",
"url": "https://bugzilla.suse.com/1200528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-19T18:45:15Z",
"details": "critical"
}
],
"title": "CVE-2022-1996"
},
{
"cve": "CVE-2022-36055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36055"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36055",
"url": "https://www.suse.com/security/cve/CVE-2022-36055"
},
{
"category": "external",
"summary": "SUSE Bug 1203054 for CVE-2022-36055",
"url": "https://bugzilla.suse.com/1203054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-3.9.4-150000.1.10.3.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.3:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.3:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.3:helm-zsh-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.aarch64",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.ppc64le",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.s390x",
"openSUSE Leap 15.4:helm-3.9.4-150000.1.10.3.x86_64",
"openSUSE Leap 15.4:helm-bash-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-fish-completion-3.9.4-150000.1.10.3.noarch",
"openSUSE Leap 15.4:helm-zsh-completion-3.9.4-150000.1.10.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-19T18:45:15Z",
"details": "important"
}
],
"title": "CVE-2022-36055"
}
]
}
OPENSUSE-SU-2024:12323-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "helm-3.9.4-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the helm-3.9.4-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12323",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12323-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36055 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36055/"
}
],
"title": "helm-3.9.4-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12323-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-2.1.aarch64",
"product": {
"name": "helm-3.9.4-2.1.aarch64",
"product_id": "helm-3.9.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.9.4-2.1.aarch64",
"product": {
"name": "helm-bash-completion-3.9.4-2.1.aarch64",
"product_id": "helm-bash-completion-3.9.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.9.4-2.1.aarch64",
"product": {
"name": "helm-fish-completion-3.9.4-2.1.aarch64",
"product_id": "helm-fish-completion-3.9.4-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.9.4-2.1.aarch64",
"product": {
"name": "helm-zsh-completion-3.9.4-2.1.aarch64",
"product_id": "helm-zsh-completion-3.9.4-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-2.1.ppc64le",
"product": {
"name": "helm-3.9.4-2.1.ppc64le",
"product_id": "helm-3.9.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.9.4-2.1.ppc64le",
"product": {
"name": "helm-bash-completion-3.9.4-2.1.ppc64le",
"product_id": "helm-bash-completion-3.9.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.9.4-2.1.ppc64le",
"product": {
"name": "helm-fish-completion-3.9.4-2.1.ppc64le",
"product_id": "helm-fish-completion-3.9.4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.9.4-2.1.ppc64le",
"product": {
"name": "helm-zsh-completion-3.9.4-2.1.ppc64le",
"product_id": "helm-zsh-completion-3.9.4-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-2.1.s390x",
"product": {
"name": "helm-3.9.4-2.1.s390x",
"product_id": "helm-3.9.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.9.4-2.1.s390x",
"product": {
"name": "helm-bash-completion-3.9.4-2.1.s390x",
"product_id": "helm-bash-completion-3.9.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.9.4-2.1.s390x",
"product": {
"name": "helm-fish-completion-3.9.4-2.1.s390x",
"product_id": "helm-fish-completion-3.9.4-2.1.s390x"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.9.4-2.1.s390x",
"product": {
"name": "helm-zsh-completion-3.9.4-2.1.s390x",
"product_id": "helm-zsh-completion-3.9.4-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.9.4-2.1.x86_64",
"product": {
"name": "helm-3.9.4-2.1.x86_64",
"product_id": "helm-3.9.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.9.4-2.1.x86_64",
"product": {
"name": "helm-bash-completion-3.9.4-2.1.x86_64",
"product_id": "helm-bash-completion-3.9.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.9.4-2.1.x86_64",
"product": {
"name": "helm-fish-completion-3.9.4-2.1.x86_64",
"product_id": "helm-fish-completion-3.9.4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.9.4-2.1.x86_64",
"product": {
"name": "helm-zsh-completion-3.9.4-2.1.x86_64",
"product_id": "helm-zsh-completion-3.9.4-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.9.4-2.1.aarch64"
},
"product_reference": "helm-3.9.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.9.4-2.1.ppc64le"
},
"product_reference": "helm-3.9.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.9.4-2.1.s390x"
},
"product_reference": "helm-3.9.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.9.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.9.4-2.1.x86_64"
},
"product_reference": "helm-3.9.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.aarch64"
},
"product_reference": "helm-bash-completion-3.9.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.ppc64le"
},
"product_reference": "helm-bash-completion-3.9.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.s390x"
},
"product_reference": "helm-bash-completion-3.9.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.9.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.x86_64"
},
"product_reference": "helm-bash-completion-3.9.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.aarch64"
},
"product_reference": "helm-fish-completion-3.9.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.ppc64le"
},
"product_reference": "helm-fish-completion-3.9.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.s390x"
},
"product_reference": "helm-fish-completion-3.9.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.9.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.x86_64"
},
"product_reference": "helm-fish-completion-3.9.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.aarch64"
},
"product_reference": "helm-zsh-completion-3.9.4-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.ppc64le"
},
"product_reference": "helm-zsh-completion-3.9.4-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.s390x"
},
"product_reference": "helm-zsh-completion-3.9.4-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.9.4-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.x86_64"
},
"product_reference": "helm-zsh-completion-3.9.4-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-36055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36055"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36055",
"url": "https://www.suse.com/security/cve/CVE-2022-36055"
},
{
"category": "external",
"summary": "SUSE Bug 1203054 for CVE-2022-36055",
"url": "https://bugzilla.suse.com/1203054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-bash-completion-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-fish-completion-3.9.4-2.1.x86_64",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.aarch64",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.ppc64le",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.s390x",
"openSUSE Tumbleweed:helm-zsh-completion-3.9.4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36055"
}
]
}
OPENSUSE-SU-2025:15779-1
Vulnerability from csaf_opensuse - Published: 2025-11-28 00:00 - Updated: 2025-11-28 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "helm3-3.19.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the helm3-3.19.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15779",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15779-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16873 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16874 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16875 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-21272 page",
"url": "https://www.suse.com/security/cve/CVE-2021-21272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1996 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23524 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23525 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23526 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36055 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25165 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25173 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-25620 page",
"url": "https://www.suse.com/security/cve/CVE-2024-25620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45337 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45337/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45338 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22870 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47911 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53547 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58190/"
}
],
"title": "helm3-3.19.2-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-28T00:00:00Z",
"generator": {
"date": "2025-11-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15779-1",
"initial_release_date": "2025-11-28T00:00:00Z",
"revision_history": [
{
"date": "2025-11-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "helm3-3.19.2-1.1.aarch64",
"product": {
"name": "helm3-3.19.2-1.1.aarch64",
"product_id": "helm3-3.19.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm3-bash-completion-3.19.2-1.1.aarch64",
"product": {
"name": "helm3-bash-completion-3.19.2-1.1.aarch64",
"product_id": "helm3-bash-completion-3.19.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm3-fish-completion-3.19.2-1.1.aarch64",
"product": {
"name": "helm3-fish-completion-3.19.2-1.1.aarch64",
"product_id": "helm3-fish-completion-3.19.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm3-zsh-completion-3.19.2-1.1.aarch64",
"product": {
"name": "helm3-zsh-completion-3.19.2-1.1.aarch64",
"product_id": "helm3-zsh-completion-3.19.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "helm3-3.19.2-1.1.ppc64le",
"product": {
"name": "helm3-3.19.2-1.1.ppc64le",
"product_id": "helm3-3.19.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm3-bash-completion-3.19.2-1.1.ppc64le",
"product": {
"name": "helm3-bash-completion-3.19.2-1.1.ppc64le",
"product_id": "helm3-bash-completion-3.19.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm3-fish-completion-3.19.2-1.1.ppc64le",
"product": {
"name": "helm3-fish-completion-3.19.2-1.1.ppc64le",
"product_id": "helm3-fish-completion-3.19.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm3-zsh-completion-3.19.2-1.1.ppc64le",
"product": {
"name": "helm3-zsh-completion-3.19.2-1.1.ppc64le",
"product_id": "helm3-zsh-completion-3.19.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "helm3-3.19.2-1.1.s390x",
"product": {
"name": "helm3-3.19.2-1.1.s390x",
"product_id": "helm3-3.19.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "helm3-bash-completion-3.19.2-1.1.s390x",
"product": {
"name": "helm3-bash-completion-3.19.2-1.1.s390x",
"product_id": "helm3-bash-completion-3.19.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "helm3-fish-completion-3.19.2-1.1.s390x",
"product": {
"name": "helm3-fish-completion-3.19.2-1.1.s390x",
"product_id": "helm3-fish-completion-3.19.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "helm3-zsh-completion-3.19.2-1.1.s390x",
"product": {
"name": "helm3-zsh-completion-3.19.2-1.1.s390x",
"product_id": "helm3-zsh-completion-3.19.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "helm3-3.19.2-1.1.x86_64",
"product": {
"name": "helm3-3.19.2-1.1.x86_64",
"product_id": "helm3-3.19.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm3-bash-completion-3.19.2-1.1.x86_64",
"product": {
"name": "helm3-bash-completion-3.19.2-1.1.x86_64",
"product_id": "helm3-bash-completion-3.19.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm3-fish-completion-3.19.2-1.1.x86_64",
"product": {
"name": "helm3-fish-completion-3.19.2-1.1.x86_64",
"product_id": "helm3-fish-completion-3.19.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm3-zsh-completion-3.19.2-1.1.x86_64",
"product": {
"name": "helm3-zsh-completion-3.19.2-1.1.x86_64",
"product_id": "helm3-zsh-completion-3.19.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-3.19.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64"
},
"product_reference": "helm3-3.19.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-3.19.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le"
},
"product_reference": "helm3-3.19.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-3.19.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x"
},
"product_reference": "helm3-3.19.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-3.19.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64"
},
"product_reference": "helm3-3.19.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-bash-completion-3.19.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64"
},
"product_reference": "helm3-bash-completion-3.19.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-bash-completion-3.19.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le"
},
"product_reference": "helm3-bash-completion-3.19.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-bash-completion-3.19.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x"
},
"product_reference": "helm3-bash-completion-3.19.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-bash-completion-3.19.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64"
},
"product_reference": "helm3-bash-completion-3.19.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-fish-completion-3.19.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64"
},
"product_reference": "helm3-fish-completion-3.19.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-fish-completion-3.19.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le"
},
"product_reference": "helm3-fish-completion-3.19.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-fish-completion-3.19.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x"
},
"product_reference": "helm3-fish-completion-3.19.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-fish-completion-3.19.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64"
},
"product_reference": "helm3-fish-completion-3.19.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-zsh-completion-3.19.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64"
},
"product_reference": "helm3-zsh-completion-3.19.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-zsh-completion-3.19.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le"
},
"product_reference": "helm3-zsh-completion-3.19.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-zsh-completion-3.19.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x"
},
"product_reference": "helm3-zsh-completion-3.19.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm3-zsh-completion-3.19.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
},
"product_reference": "helm3-zsh-completion-3.19.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16873"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16873",
"url": "https://www.suse.com/security/cve/CVE-2018-16873"
},
{
"category": "external",
"summary": "SUSE Bug 1118897 for CVE-2018-16873",
"url": "https://bugzilla.suse.com/1118897"
},
{
"category": "external",
"summary": "SUSE Bug 1118898 for CVE-2018-16873",
"url": "https://bugzilla.suse.com/1118898"
},
{
"category": "external",
"summary": "SUSE Bug 1118899 for CVE-2018-16873",
"url": "https://bugzilla.suse.com/1118899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-16873"
},
{
"cve": "CVE-2018-16874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16874"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16874",
"url": "https://www.suse.com/security/cve/CVE-2018-16874"
},
{
"category": "external",
"summary": "SUSE Bug 1118897 for CVE-2018-16874",
"url": "https://bugzilla.suse.com/1118897"
},
{
"category": "external",
"summary": "SUSE Bug 1118898 for CVE-2018-16874",
"url": "https://bugzilla.suse.com/1118898"
},
{
"category": "external",
"summary": "SUSE Bug 1118899 for CVE-2018-16874",
"url": "https://bugzilla.suse.com/1118899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16874"
},
{
"cve": "CVE-2018-16875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16875"
}
],
"notes": [
{
"category": "general",
"text": "The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16875",
"url": "https://www.suse.com/security/cve/CVE-2018-16875"
},
{
"category": "external",
"summary": "SUSE Bug 1118897 for CVE-2018-16875",
"url": "https://bugzilla.suse.com/1118897"
},
{
"category": "external",
"summary": "SUSE Bug 1118898 for CVE-2018-16875",
"url": "https://bugzilla.suse.com/1118898"
},
{
"category": "external",
"summary": "SUSE Bug 1118899 for CVE-2018-16875",
"url": "https://bugzilla.suse.com/1118899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16875"
},
{
"cve": "CVE-2021-21272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-21272"
}
],
"notes": [
{
"category": "general",
"text": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-21272",
"url": "https://www.suse.com/security/cve/CVE-2021-21272"
},
{
"category": "external",
"summary": "SUSE Bug 1181419 for CVE-2021-21272",
"url": "https://bugzilla.suse.com/1181419"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-21272"
},
{
"cve": "CVE-2022-1996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1996"
}
],
"notes": [
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1996",
"url": "https://www.suse.com/security/cve/CVE-2022-1996"
},
{
"category": "external",
"summary": "SUSE Bug 1200528 for CVE-2022-1996",
"url": "https://bugzilla.suse.com/1200528"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2022-1996"
},
{
"cve": "CVE-2022-23524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23524"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to Uncontrolled Resource Consumption, resulting in Denial of Service. Input to functions in the _strvals_ package can cause a stack overflow. In Go, a stack overflow cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics. This issue has been patched in 3.10.3. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23524",
"url": "https://www.suse.com/security/cve/CVE-2022-23524"
},
{
"category": "external",
"summary": "SUSE Bug 1206467 for CVE-2022-23524",
"url": "https://bugzilla.suse.com/1206467"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23525"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the _repo_package. The _repo_ package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The _repo_ package parses the index file of the repository and loads it into structures Go can work with. Some index files can cause array data structures to be created causing a memory violation. Applications that use the _repo_ package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been patched in 3.10.3. SDK users can validate index files that are correctly formatted before passing them to the _repo_ functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23525",
"url": "https://www.suse.com/security/cve/CVE-2022-23525"
},
{
"category": "external",
"summary": "SUSE Bug 1206469 for CVE-2022-23525",
"url": "https://bugzilla.suse.com/1206469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23526"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts, pre-configured Kubernetes resources. Versions prior to 3.10.3 are subject to NULL Pointer Dereference in the_chartutil_ package that can cause a segmentation violation. The _chartutil_ package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The _chartutil_ package parses the schema file and loads it into structures Go can work with. Some schema files can cause array data structures to be created causing a memory violation. Applications that use the _chartutil_ package in the Helm SDK to parse a schema file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been patched in 3.10.3. SDK users can validate schema files that are correctly formatted before passing them to the _chartutil_ functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23526",
"url": "https://www.suse.com/security/cve/CVE-2022-23526"
},
{
"category": "external",
"summary": "SUSE Bug 1206471 for CVE-2022-23526",
"url": "https://bugzilla.suse.com/1206471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-36055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36055"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36055",
"url": "https://www.suse.com/security/cve/CVE-2022-36055"
},
{
"category": "external",
"summary": "SUSE Bug 1203054 for CVE-2022-36055",
"url": "https://bugzilla.suse.com/1203054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36055"
},
{
"cve": "CVE-2023-25165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25165"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25165",
"url": "https://www.suse.com/security/cve/CVE-2023-25165"
},
{
"category": "external",
"summary": "SUSE Bug 1208083 for CVE-2023-25165",
"url": "https://bugzilla.suse.com/1208083"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-25165"
},
{
"cve": "CVE-2023-25173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25173"
}
],
"notes": [
{
"category": "general",
"text": "containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well.\n\nThis bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd\u0027s client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `\"USER $USERNAME\"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT [\"su\", \"-\", \"user\"]` to allow `su` to properly set up supplementary groups.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25173",
"url": "https://www.suse.com/security/cve/CVE-2023-25173"
},
{
"category": "external",
"summary": "SUSE Bug 1208426 for CVE-2023-25173",
"url": "https://bugzilla.suse.com/1208426"
},
{
"category": "external",
"summary": "SUSE Bug 1215588 for CVE-2023-25173",
"url": "https://bugzilla.suse.com/1215588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2024-25620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-25620"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. When either the Helm client or SDK is used to save a chart whose name within the `Chart.yaml` file includes a relative path change, the chart would be saved outside its expected directory based on the changes in the relative path. The validation and linting did not detect the path changes in the name. This issue has been resolved in Helm v3.14.1. Users unable to upgrade should check all charts used by Helm for path changes in their name as found in the `Chart.yaml` file. This includes dependencies.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-25620",
"url": "https://www.suse.com/security/cve/CVE-2024-25620"
},
{
"category": "external",
"summary": "SUSE Bug 1219969 for CVE-2024-25620",
"url": "https://bugzilla.suse.com/1219969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-25620"
},
{
"cve": "CVE-2024-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26147"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a package manager for Charts for Kubernetes. Versions prior to 3.14.2 contain an uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content. When either an `index.yaml` file or a plugins `plugin.yaml` file were missing all metadata a panic would occur in Helm. In the Helm SDK, this is found when using the `LoadIndexFile` or `DownloadIndexFile` functions in the `repo` package or the `LoadDir` function in the `plugin` package. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation. This issue has been resolved in Helm v3.14.2. If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem. If using Helm SDK versions prior to 3.14.2, calls to affected functions can use `recover` to catch the panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26147",
"url": "https://www.suse.com/security/cve/CVE-2024-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1220207 for CVE-2024-26147",
"url": "https://bugzilla.suse.com/1220207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-26147"
},
{
"cve": "CVE-2024-45337",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45337"
}
],
"notes": [
{
"category": "general",
"text": "Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that \"A call to this function does not guarantee that the key offered is in fact used to authenticate.\" Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45337",
"url": "https://www.suse.com/security/cve/CVE-2024-45337"
},
{
"category": "external",
"summary": "SUSE Bug 1234482 for CVE-2024-45337",
"url": "https://bugzilla.suse.com/1234482"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-45337"
},
{
"cve": "CVE-2024-45338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45338"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45338",
"url": "https://www.suse.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "SUSE Bug 1234794 for CVE-2024-45338",
"url": "https://bugzilla.suse.com/1234794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-45338"
},
{
"cve": "CVE-2025-22870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22870"
}
],
"notes": [
{
"category": "general",
"text": "Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to \"*.example.com\", a request to \"[::1%25.example.com]:80` will incorrectly match and not be proxied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22870",
"url": "https://www.suse.com/security/cve/CVE-2025-22870"
},
{
"category": "external",
"summary": "SUSE Bug 1238572 for CVE-2025-22870",
"url": "https://bugzilla.suse.com/1238572"
},
{
"category": "external",
"summary": "SUSE Bug 1238611 for CVE-2025-22870",
"url": "https://bugzilla.suse.com/1238611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22870"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
},
{
"cve": "CVE-2025-47911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47911"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47911",
"url": "https://www.suse.com/security/cve/CVE-2025-47911"
},
{
"category": "external",
"summary": "SUSE Bug 1251308 for CVE-2025-47911",
"url": "https://bugzilla.suse.com/1251308"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-47911"
},
{
"cve": "CVE-2025-53547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53547"
}
],
"notes": [
{
"category": "general",
"text": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53547",
"url": "https://www.suse.com/security/cve/CVE-2025-53547"
},
{
"category": "external",
"summary": "SUSE Bug 1246150 for CVE-2025-53547",
"url": "https://bugzilla.suse.com/1246150"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-53547"
},
{
"cve": "CVE-2025-58190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58190"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58190",
"url": "https://www.suse.com/security/cve/CVE-2025-58190"
},
{
"category": "external",
"summary": "SUSE Bug 1251309 for CVE-2025-58190",
"url": "https://bugzilla.suse.com/1251309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm3-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-bash-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-fish-completion-3.19.2-1.1.x86_64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.aarch64",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.ppc64le",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.s390x",
"openSUSE Tumbleweed:helm3-zsh-completion-3.19.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-58190"
}
]
}
WID-SEC-W-2023-0138
Vulnerability from csaf_certbund - Published: 2023-01-17 23:00 - Updated: 2025-06-03 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0138 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0138.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0138 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0138"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Communications Applications vom 2023-01-17",
"url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixCAGBU"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8432 vom 2025-06-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-8432.html"
}
],
"source_lang": "en-US",
"title": "Oracle Communications Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-03T22:00:00.000+00:00",
"generator": {
"date": "2025-06-04T10:08:35.396+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2023-0138",
"initial_release_date": "2023-01-17T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-01-17T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "6.3.1",
"product": {
"name": "Oracle Communications Applications 6.3.1",
"product_id": "T018935",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:6.3.1"
}
}
},
{
"category": "product_version",
"name": "7.4.0",
"product": {
"name": "Oracle Communications Applications 7.4.0",
"product_id": "T018938",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.0"
}
}
},
{
"category": "product_version",
"name": "7.4.1",
"product": {
"name": "Oracle Communications Applications 7.4.1",
"product_id": "T018939",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.4.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=7.4.2",
"product": {
"name": "Oracle Communications Applications \u003c=7.4.2",
"product_id": "T018940"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.4.2",
"product": {
"name": "Oracle Communications Applications \u003c=7.4.2",
"product_id": "T018940-fixed"
}
},
{
"category": "product_version",
"name": "8.0.0.6.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.6.0",
"product_id": "T020662",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.6.0"
}
}
},
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "Oracle Communications Applications 7.5.0",
"product_id": "T021639",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:7.5.0"
}
}
},
{
"category": "product_version",
"name": "10.0.1.6.0",
"product": {
"name": "Oracle Communications Applications 10.0.1.6.0",
"product_id": "T024967",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:10.0.1.6.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.7.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.7.0",
"product_id": "T024968"
}
},
{
"category": "product_version_range",
"name": "\u003c=12.0.0.7.0",
"product": {
"name": "Oracle Communications Applications \u003c=12.0.0.7.0",
"product_id": "T024968-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=5.5.9",
"product": {
"name": "Oracle Communications Applications \u003c=5.5.9",
"product_id": "T025857"
}
},
{
"category": "product_version_range",
"name": "\u003c=5.5.9",
"product": {
"name": "Oracle Communications Applications \u003c=5.5.9",
"product_id": "T025857-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=6.0.1",
"product": {
"name": "Oracle Communications Applications \u003c=6.0.1",
"product_id": "T025858"
}
},
{
"category": "product_version_range",
"name": "\u003c=6.0.1",
"product": {
"name": "Oracle Communications Applications \u003c=6.0.1",
"product_id": "T025858-fixed"
}
},
{
"category": "product_version",
"name": "3.0.3.1.0",
"product": {
"name": "Oracle Communications Applications 3.0.3.1.0",
"product_id": "T025859",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:3.0.3.1.0"
}
}
},
{
"category": "product_version",
"name": "8.0.0.7.0",
"product": {
"name": "Oracle Communications Applications 8.0.0.7.0",
"product_id": "T025860",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.0.0.7.0"
}
}
},
{
"category": "product_version",
"name": "8.1.0.20.0",
"product": {
"name": "Oracle Communications Applications 8.1.0.20.0",
"product_id": "T025861",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications_applications:8.1.0.20.0"
}
}
}
],
"category": "product_name",
"name": "Communications Applications"
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17571",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2019-17571"
},
{
"cve": "CVE-2020-16156",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2020-16156"
},
{
"cve": "CVE-2021-41411",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2021-41411"
},
{
"cve": "CVE-2021-43797",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2022-22971",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-22971"
},
{
"cve": "CVE-2022-22978",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-25647",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-25857",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-30126",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-30126"
},
{
"cve": "CVE-2022-31692",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-31692"
},
{
"cve": "CVE-2022-3171",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-32212",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-32212"
},
{
"cve": "CVE-2022-33980",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-33980"
},
{
"cve": "CVE-2022-34917",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-34917"
},
{
"cve": "CVE-2022-35737",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36055",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-36055"
},
{
"cve": "CVE-2022-37454",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38752",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39271",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-39271"
},
{
"cve": "CVE-2022-40146",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-40146"
},
{
"cve": "CVE-2022-40150",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-41720",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-42003",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42252",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-42252"
},
{
"cve": "CVE-2022-42889",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2023-21824",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2023-21824"
},
{
"cve": "CVE-2023-21848",
"product_status": {
"known_affected": [
"T025859",
"T024967",
"T020662",
"T018935",
"T025861",
"T021639",
"T018938",
"T004914",
"T018939",
"T025860"
],
"last_affected": [
"T024968",
"T025858",
"T018940",
"T025857"
]
},
"release_date": "2023-01-17T23:00:00.000+00:00",
"title": "CVE-2023-21848"
}
]
}
WID-SEC-W-2022-2339
Vulnerability from csaf_certbund - Published: 2022-12-14 23:00 - Updated: 2023-04-18 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2339 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2339.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2339 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2339"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6984413 vom 2023-04-18",
"url": "https://www.ibm.com/support/pages/node/6984413"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2022-12-14",
"url": "https://www.ibm.com/support/pages/node/6843071"
}
],
"source_lang": "en-US",
"title": "IBM DB2: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-04-18T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:40:03.847+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2339",
"initial_release_date": "2022-12-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-12-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-04-18T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM DB2",
"product": {
"name": "IBM DB2",
"product_id": "5104",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:-"
}
}
},
{
"category": "product_name",
"name": "IBM DB2 Cloud Pak for Data \u003c 4.6",
"product": {
"name": "IBM DB2 Cloud Pak for Data \u003c 4.6",
"product_id": "T025618",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:cloud_pak_for_data__4.6"
}
}
}
],
"category": "product_name",
"name": "DB2"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1000023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2016-1000023"
},
{
"cve": "CVE-2021-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2021-21303"
},
{
"cve": "CVE-2021-32690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2021-32690"
},
{
"cve": "CVE-2022-27664",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3172",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-3172"
},
{
"cve": "CVE-2022-36055",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-36055"
},
{
"cve": "CVE-2022-41296",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-41296"
},
{
"cve": "CVE-2022-41297",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in IBM DB2 on Cloud Pak for Data and DB2 Warehouse on Cloud Pak for Data. Diese bestehen in den Komponenten Minimatch, Db2U, Helm, kube-apiserver und Golang Go. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Interaktion des Opfers notwendig."
}
],
"product_status": {
"known_affected": [
"T025618",
"5104"
]
},
"release_date": "2022-12-14T23:00:00.000+00:00",
"title": "CVE-2022-41297"
}
]
}
CNVD-2022-62221
Vulnerability from cnvd - Published: 2022-09-08目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh
| Name | helm helm |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-36055"
}
},
"description": "Helm\u662f\u4e00\u6b3eKubernetes\u5305\u7ba1\u7406\u5668\u3002\n\nHelm 3.9.3\u7248\u672c\u53ca\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e CNCF \u63d0\u4f9b\u7684\u6a21\u7cca\u6d4b\u8bd5\u8bc6\u522b\u4e86 _strvals_ \u5305\u4e2d\u53ef\u80fd\u5bfc\u81f4\u5185\u5b58\u4e0d\u8db3\u6050\u614c\u7684\u51fd\u6570\u7684\u8f93\u5165\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-62221",
"openTime": "2022-09-08",
"patchDescription": "Helm\u662f\u4e00\u6b3eKubernetes\u5305\u7ba1\u7406\u5668\u3002\r\n\r\nHelm 3.9.3\u7248\u672c\u53ca\u4e4b\u524d\u7248\u672c\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e CNCF \u63d0\u4f9b\u7684\u6a21\u7cca\u6d4b\u8bd5\u8bc6\u522b\u4e86 _strvals_ \u5305\u4e2d\u53ef\u80fd\u5bfc\u81f4\u5185\u5b58\u4e0d\u8db3\u6050\u614c\u7684\u51fd\u6570\u7684\u8f93\u5165\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Helm\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "helm helm"
},
"referenceLink": "https://cxsecurity.com/cveshow/CVE-2022-36055/",
"serverity": "\u4e2d",
"submitTime": "2022-09-05",
"title": "Helm\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e"
}
FKIE_CVE-2022-36055
Vulnerability from fkie_nvd - Published: 2022-09-01 13:15 - Updated: 2024-11-21 07:126.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/helm/helm/releases/tag/v3.9.4 | Release Notes, Third Party Advisory | |
| security-advisories@github.com | https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/helm/helm/releases/tag/v3.9.4 | Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF12F100-CF74-44E7-9CA3-587E32370849",
"versionEndExcluding": "3.9.4",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions."
},
{
"lang": "es",
"value": "Helm es una herramienta para administrar Charts. Los Charts son paquetes de recursos Kubernetes preconfigurados. Las pruebas Fuzz, proporcionadas por el CNCF, identificaron la entrada de funciones en el paquete _strvals_ que pueden causar un p\u00e1nico de memoria. El paquete _strvals_ contiene un analizador que convierte las cadenas en estructuras Go. El paquete _strvals_ convierte estas cadenas en estructuras con las que Go puede trabajar. Algunas entradas de cadenas pueden causar la creaci\u00f3n de estructuras de datos de array causando un p\u00e1nico de memoria. Las aplicaciones que usan el paquete _strvals_ en el SDK de Helm para analizar la entrada suministrada por el usuario pueden sufrir una Denegaci\u00f3n de Servicio cuando esa entrada causa un p\u00e1nico del que no puede recuperarse. El cliente de Helm entrar\u00e1 en p\u00e1nico con la entrada de \"--set\", \"--set-string\", y otros flags de configuraci\u00f3n de valores que causan un p\u00e1nico de memoria. Helm no es un servicio de larga duraci\u00f3n, por lo que el p\u00e1nico no afectar\u00e1 a futuros usos del cliente Helm. Este problema ha sido resuelto en versi\u00f3n 3.9.4. Los usuarios del SDK pueden comprender que las cadenas suministradas por los usuarios no crear\u00e1n matrices grandes que causen un uso significativo de la memoria antes de pasarlas a las funciones _strvals_"
}
],
"id": "CVE-2022-36055",
"lastModified": "2024-11-21T07:12:16.797",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-09-01T13:15:08.930",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2022-AVI-1069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Db2 Warehouse on Cloud Pak for Data versions antérieures à v4.6 | ||
| IBM | Sterling Control Center | IBM Sterling Control Center versions antérieures à 6.2.1.0 iFix09 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions antérieures à v4.6 | ||
| IBM | N/A | IBM Watson Discovery versions antérieures à 4.6.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions ant\u00e9rieures \u00e0 6.2.1.0 iFix09",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Watson Discovery versions ant\u00e9rieures \u00e0 4.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21303"
},
{
"name": "CVE-2016-1000023",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000023"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-36055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36055"
},
{
"name": "CVE-2021-32690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32690"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2022-41296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41296"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3172"
},
{
"name": "CVE-2022-41297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41297"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-1069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6840941 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6840941"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6842547 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6842547"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6840925 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6840925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6843071 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6843071"
}
]
}
CERTFR-2022-AVI-1069
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | IBM Db2 Warehouse on Cloud Pak for Data versions antérieures à v4.6 | ||
| IBM | Sterling Control Center | IBM Sterling Control Center versions antérieures à 6.2.1.0 iFix09 | ||
| IBM | N/A | IBM Db2 on Cloud Pak for Data versions antérieures à v4.6 | ||
| IBM | N/A | IBM Watson Discovery versions antérieures à 4.6.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Control Center versions ant\u00e9rieures \u00e0 6.2.1.0 iFix09",
"product": {
"name": "Sterling Control Center",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Watson Discovery versions ant\u00e9rieures \u00e0 4.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21303"
},
{
"name": "CVE-2016-1000023",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000023"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-36055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36055"
},
{
"name": "CVE-2021-32690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32690"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2022-41296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41296"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3172"
},
{
"name": "CVE-2022-41297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41297"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-1069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6840941 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6840941"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6842547 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6842547"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6840925 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6840925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6843071 du 30 novembre 2022",
"url": "https://www.ibm.com/support/pages/node/6843071"
}
]
}
MSRC_CVE-2022-36055
Vulnerability from csaf_microsoft - Published: 2022-09-02 00:00 - Updated: 2022-09-09 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36055 Denial of service in Helm - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-36055.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Denial of service in Helm",
"tracking": {
"current_release_date": "2022-09-09T00:00:00.000Z",
"generator": {
"date": "2025-10-19T23:55:36.228Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-36055",
"initial_release_date": "2022-09-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-09-09T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 helm 3.4.1-17",
"product": {
"name": "\u003ccm1 helm 3.4.1-17",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 helm 3.4.1-17",
"product": {
"name": "cm1 helm 3.4.1-17",
"product_id": "18620"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 helm 3.9.4-2",
"product": {
"name": "\u003ccbl2 helm 3.9.4-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 helm 3.9.4-2",
"product": {
"name": "cbl2 helm 3.9.4-2",
"product_id": "18621"
}
}
],
"category": "product_name",
"name": "helm"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 helm 3.4.1-17 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 helm 3.4.1-17 as a component of CBL Mariner 1.0",
"product_id": "18620-16820"
},
"product_reference": "18620",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 helm 3.9.4-2 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 helm 3.9.4-2 as a component of CBL Mariner 2.0",
"product_id": "18621-17086"
},
"product_reference": "18621",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-36055",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18620-16820",
"18621-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36055 Denial of service in Helm - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-36055.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-09T00:00:00.000Z",
"details": "3.4.1-17:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-09-09T00:00:00.000Z",
"details": "3.9.4-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "Denial of service in Helm"
}
]
}
GSD-2022-36055
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-36055",
"description": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.",
"id": "GSD-2022-36055",
"references": [
"https://www.suse.com/security/cve/CVE-2022-36055.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-36055"
],
"details": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.",
"id": "GSD-2022-36055",
"modified": "2023-12-13T01:19:21.881614Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-36055",
"STATE": "PUBLIC",
"TITLE": "Denial of service in Helm"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "helm",
"version": {
"version_data": [
{
"version_value": "\u003c 3.9.4"
}
]
}
}
]
},
"vendor_name": "helm"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh",
"refsource": "CONFIRM",
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
},
{
"name": "https://github.com/helm/helm/releases/tag/v3.9.4",
"refsource": "MISC",
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
}
]
},
"source": {
"advisory": "GHSA-7hfp-qfw3-5jxh",
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003cv3.9.4",
"affected_versions": "All versions before 3.9.4",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2022-08-30",
"description": "Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the _strvals_ package in the Helm SDK can have a Denial of Service attack when they use this package and it panics.\n\n### Impact\n\nThe _strvals_ package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like `--set`, `--set-string`, and others that enable the user to pass in strings that are merged into the values. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.\n\nApplications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.\n\n### Patches\n\nThis issue has been resolved in 3.9.4. \n\n### Workarounds\n\nSDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions.\n\n### For more information\n\nHelm\u0027s security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.\n\n### Credits\n\nDisclosed by Ada Logics in a fuzzing audit sponsored by CNCF.",
"fixed_versions": [
"v3.9.4"
],
"identifier": "GMS-2022-3755",
"identifiers": [
"GHSA-7hfp-qfw3-5jxh",
"GMS-2022-3755",
"CVE-2022-36055"
],
"not_impacted": "All versions starting from 3.9.4",
"package_slug": "go/helm.sh/helm/v3",
"pubdate": "2022-08-30",
"solution": "Upgrade to version 3.9.4 or above.",
"title": "Denial of service through string value parsing",
"urls": [
"https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh",
"https://github.com/advisories/GHSA-7hfp-qfw3-5jxh"
],
"uuid": "55d3fbd5-8477-4933-9bc7-a8a08dfd4f5e",
"versions": []
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.9.4",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-36055"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won\u0027t create large arrays causing significant memory usage before passing them to the _strvals_ functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/helm/helm/releases/tag/v3.9.4",
"refsource": "MISC",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/releases/tag/v3.9.4"
},
{
"name": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-07-21T20:52Z",
"publishedDate": "2022-09-01T13:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.