Security update for helm
Announcement ID: |
SUSE-SU-2024:1137-1 |
Rating: |
moderate |
References: |
|
Cross-References:
|
|
CVSS scores: |
-
CVE-2024-25620
(
SUSE
):
6.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
-
CVE-2024-26147
(
SUSE
):
5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
Affected Products: |
- Containers Module 15-SP5
- openSUSE Leap 15.5
- SUSE Linux Enterprise Desktop 15 SP5
- SUSE Linux Enterprise High Performance Computing 15 SP5
- SUSE Linux Enterprise Micro 5.5
- SUSE Linux Enterprise Real Time 15 SP5
- SUSE Linux Enterprise Server 15 SP5
- SUSE Linux Enterprise Server for SAP Applications 15 SP5
- SUSE Package Hub 15 15-SP5
|
An update that solves two vulnerabilities can now be installed.
Description:
This update for helm fixes the following issues:
- CVE-2024-25620: Fixed with dependency management path traversal (bsc#1219969).
- CVE-2024-26147: Fixed uninitialized variable in yaml parsing (bsc#1220207).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1137=1
-
Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-1137=1
-
SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1137=1
Package List:
-
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
- helm-3.13.3-150000.1.32.1
- helm-debuginfo-3.13.3-150000.1.32.1
-
openSUSE Leap 15.5 (noarch)
- helm-zsh-completion-3.13.3-150000.1.32.1
- helm-bash-completion-3.13.3-150000.1.32.1
- helm-fish-completion-3.13.3-150000.1.32.1
-
Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- helm-3.13.3-150000.1.32.1
- helm-debuginfo-3.13.3-150000.1.32.1
-
Containers Module 15-SP5 (noarch)
- helm-zsh-completion-3.13.3-150000.1.32.1
- helm-bash-completion-3.13.3-150000.1.32.1
-
SUSE Package Hub 15 15-SP5 (noarch)
- helm-fish-completion-3.13.3-150000.1.32.1
References: