CVE-2024-26147 Affecting chartmuseum package, versions <0.16.1-r3


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-CHARTMUSEUM-6276586
  • published26 Feb 2024
  • disclosed21 Feb 2024

Introduced: 21 Feb 2024

CVE-2024-26147  (opens in a new tab)

How to fix?

Upgrade Chainguard chartmuseum to version 0.16.1-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream chartmuseum package and not the chartmuseum package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Helm is a package manager for Charts for Kubernetes. Versions prior to 3.14.2 contain an uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content. When either an index.yaml file or a plugins plugin.yaml file were missing all metadata a panic would occur in Helm. In the Helm SDK, this is found when using the LoadIndexFile or DownloadIndexFile functions in the repo package or the LoadDir function in the plugin package. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation. This issue has been resolved in Helm v3.14.2. If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem. If using Helm SDK versions prior to 3.14.2, calls to affected functions can use recover to catch the panic.

CVSS Scores

version 3.1