Stack-based Buffer Overflow Affecting helm-push package, versions <0.10.4-r26


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-HELMPUSH-9726206
  • published16 Apr 2025
  • disclosed9 Apr 2025

Introduced: 9 Apr 2025

NewCVE-2025-32387  (opens in a new tab)
CWE-121  (opens in a new tab)
CWE-674  (opens in a new tab)

How to fix?

Upgrade Chainguard helm-push to version 0.10.4-r26 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream helm-push package and not the helm-push package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Helm is a package manager for Charts for Kubernetes. A JSON Schema file within a chart can be crafted with a deeply nested chain of references, leading to parser recursion that can exceed the stack size limit and trigger a stack overflow. This issue has been resolved in Helm v3.17.3.