Skip to content

Update module helm.sh/helm/v3 to v3.18.5 [SECURITY]#8

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-helm.sh-helm-v3-vulnerability
Open

Update module helm.sh/helm/v3 to v3.18.5 [SECURITY]#8
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-helm.sh-helm-v3-vulnerability

Conversation

@renovate
Copy link

@renovate renovate bot commented Jul 8, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
helm.sh/helm/v3 v3.18.3v3.18.5 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-53547

A Helm contributor discovered that a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated.

Impact

Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking.

This affects when dependencies are updated. When using the helm command this happens when helm dependency update is run. helm dependency build can write a lock file when one does not exist but this vector requires one to already exist. This affects the Helm SDK when the downloader Manager performs an update.

Patches

This issue has been resolved in Helm v3.18.4

Workarounds

Ensure the Chart.lock file in a chart is not a symlink prior to updating dependencies.

For more information

Helm's security policy is spelled out in detail in our SECURITY document.

Credits

Disclosed by Jakub Ciolek at AlphaSense.

CVE-2025-55199

A Helm contributor discovered that it was possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination.

Impact

A malicious chart can point $ref in values.schema.json to a device (e.g. /dev/*) or other problem file which could cause Helm to use all available memory and have an out of memory (OOM) termination.

Patches

This issue has been resolved in Helm v3.18.5.

Workarounds

Make sure that all Helm charts that are being loaded into Helm doesn't have any reference of $ref pointing to /dev/zero.

References

Helm's security policy is spelled out in detail in our SECURITY document.

Credits

Disclosed by Jakub Ciolek at AlphaSense.

CVE-2025-55198

A Helm contributor discovered an improper validation of type error when parsing Chart.yaml and index.yaml files that can lead to a panic.

Impact

There are two areas of YAML validation that were impacted. First, when a Chart.yaml file had a null maintainer or the child or parent of a dependencies import-values could be parsed as something other than a string, helm lint would panic. Second, when an index.yaml had an empty entry in the list of chart versions Helm would panic on interactions with that repository.

Patches

This issue has been resolved in Helm v3.18.5.

Workarounds

Ensure YAML files are formatted as Helm expects prior to processing them with Helm.

References

Helm's security policy is spelled out in detail in our SECURITY document.

Credits

Disclosed by Jakub Ciolek at AlphaSense.


Release Notes

helm/helm (helm.sh/helm/v3)

v3.18.5: Helm v3.18.5

Compare Source

Helm v3.18.5 is a security release. Users are encouraged to upgrade for the best experience.

The community keeps growing, and we'd love to see you there!

  • Join the discussion in Kubernetes Slack:
    • for questions and just to hang out
    • for discussing PRs, code, and bugs
  • Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
  • Test, debug, and contribute charts: ArtifactHub/packages
Security Advisories
Installation and Upgrading

Download Helm v3.18.5. The common platform binaries are here:

The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with bash.

What's Next
  • 3.19.0 is the next minor release and will be on September 11, 2025
Changelog
  • fix Chart.yaml handling 7799b48 (Matt Farina)
  • Handle messy index files dd8502f (Matt Farina)
  • json schema fix cb8595b (Robert Sirchia)

v3.18.4: Helm v3.18.4

Compare Source

Helm v3.18.4 is a security release. Users are encouraged to upgrade for the best experience.

The community keeps growing, and we'd love to see you there!

  • Join the discussion in Kubernetes Slack:
    • for questions and just to hang out
    • for discussing PRs, code, and bugs
  • Hang out at the Public Developer Call: Thursday, 9:30 Pacific via Zoom
  • Test, debug, and contribute charts: ArtifactHub/packages
Security Advisories
Installation and Upgrading

Download Helm v3.18.4. The common platform binaries are here:

The Quickstart Guide will get you going from there. For upgrade instructions or detailed installation notes, check the install guide. You can also use a script to install on any system with bash.

What's Next
  • 3.18.5 is the next patch release and will be on August 13, 2025
  • 3.19.0 is the next minor release and will be on September 11, 2025
Changelog
  • Disabling linter due to unknown issue f20a4ad (Matt Farina)
  • build(deps): bump the k8s-io group with 7 updates 563b094 (dependabot[bot])
  • Updating link handling 00de613 (Matt Farina)

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Author

renovate bot commented Jul 8, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 14 additional dependencies were updated

Details:

Package Change
github.com/spf13/pflag v1.0.6 -> v1.0.7
golang.org/x/sync v0.15.0 -> v0.16.0
golang.org/x/sys v0.33.0 -> v0.34.0
golang.org/x/term v0.32.0 -> v0.33.0
golang.org/x/text v0.26.0 -> v0.27.0
k8s.io/api v0.33.1 -> v0.33.3
k8s.io/apiextensions-apiserver v0.33.1 -> v0.33.3
k8s.io/apimachinery v0.33.1 -> v0.33.3
k8s.io/apiserver v0.33.1 -> v0.33.3
k8s.io/cli-runtime v0.33.1 -> v0.33.3
k8s.io/client-go v0.33.1 -> v0.33.3
k8s.io/component-base v0.33.1 -> v0.33.3
k8s.io/kubectl v0.33.1 -> v0.33.3
sigs.k8s.io/yaml v1.4.0 -> v1.5.0

@renovate renovate bot force-pushed the renovate/go-helm.sh-helm-v3-vulnerability branch from a3b8677 to 78675f2 Compare August 11, 2025 03:59
@renovate renovate bot changed the title Update module helm.sh/helm/v3 to v3.18.4 [SECURITY] Update module helm.sh/helm/v3 to v3.18.5 [SECURITY] Aug 16, 2025
@renovate renovate bot force-pushed the renovate/go-helm.sh-helm-v3-vulnerability branch from 78675f2 to f2ad3e1 Compare August 16, 2025 03:06
@renovate
Copy link
Author

renovate bot commented Dec 16, 2025

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 14 additional dependencies were updated

Details:

Package Change
github.com/spf13/pflag v1.0.6 -> v1.0.7
golang.org/x/sync v0.15.0 -> v0.16.0
golang.org/x/sys v0.33.0 -> v0.34.0
golang.org/x/term v0.32.0 -> v0.33.0
golang.org/x/text v0.26.0 -> v0.27.0
k8s.io/api v0.33.1 -> v0.33.3
k8s.io/apiextensions-apiserver v0.33.1 -> v0.33.3
k8s.io/apimachinery v0.33.1 -> v0.33.3
k8s.io/apiserver v0.33.1 -> v0.33.3
k8s.io/cli-runtime v0.33.1 -> v0.33.3
k8s.io/client-go v0.33.1 -> v0.33.3
k8s.io/component-base v0.33.1 -> v0.33.3
k8s.io/kubectl v0.33.1 -> v0.33.3
sigs.k8s.io/yaml v1.4.0 -> v1.5.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants