Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:1328", "cpe": "cpe:/a:redhat:acm:2.9::el8", "package": "rhacm2/acm-governance-policy-addon-controller-rhel8:v2.9.3-9", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2.9 for RHEL 8", "release_date": "2024-03-14T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-central-db-rhel8:4.3.6-2", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-collector-rhel8:4.3.6-3", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-collector-slim-rhel8:4.3.6-1", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-main-rhel8:4.3.6-4", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-operator-bundle:4.3.6-4", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-rhel8-operator:4.3.6-2", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-roxctl-rhel8:4.3.6-2", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-scanner-db-rhel8:4.3.6-3", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8:4.3.6-1", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-scanner-rhel8:4.3.6-3", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1549", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.3::el8", "package": "advanced-cluster-security/rhacs-scanner-slim-rhel8:4.3.6-3", "product_name": "Red Hat Advanced Cluster Security 4.3", "release_date": "2024-03-27T00:00:00Z"}, {"advisory": "RHSA-2024:1570", "cpe": "cpe:/a:redhat:advanced_cluster_security:4.4::el8", "package": "advanced-cluster-security/rhacs-main-rhel8:4.4.0-17", "product_name": "Red Hat Advanced Cluster Security 4.4", "release_date": "2024-03-28T00:00:00Z"}, {"advisory": "RHSA-2024:6013", "cpe": "cpe:/a:redhat:openshift:4.15::el8", "package": "openshift4/ose-console:v4.15.0-202408281825.p0.gbbdbb94.assembly.stream.el8", "product_name": "Red Hat OpenShift Container Platform 4.15", "release_date": "2024-09-05T00:00:00Z"}, {"advisory": "RHSA-2024:2865", "cpe": "cpe:/a:redhat:openshift:4.15::el9", "package": "openshift4/ose-azure-cluster-api-controllers-rhel9:v4.15.0-202405130639.p0.g0584f1f.assembly.stream.el9", "product_name": "Red Hat OpenShift Container Platform 4.15", "release_date": "2024-05-21T00:00:00Z"}, {"advisory": "RHSA-2024:4156", "cpe": "cpe:/a:redhat:openshift:4.16::el9", "package": "openshift4/ose-console-rhel9:v4.16.0-202406260236.p0.ga7502a0.assembly.stream.el9", "product_name": "Red Hat OpenShift Container Platform 4.16", "release_date": "2024-07-03T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/argocd-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/argo-rollouts-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/console-plugin-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/dex-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/gitops-operator-bundle:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/gitops-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/gitops-rhel8-operator:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/kam-delivery-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4626", "cpe": "cpe:/a:redhat:openshift_gitops:1.11::el8", "package": "openshift-gitops-1/must-gather-rhel8:v1.11.6-2", "product_name": "Red Hat OpenShift GitOps 1.11", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/argocd-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/argo-rollouts-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/console-plugin-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/dex-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/gitops-operator-bundle:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/gitops-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/gitops-rhel8-operator:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/kam-delivery-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el8", "package": "openshift-gitops-1/must-gather-rhel8:v1.12.4-5", "product_name": "Red Hat OpenShift GitOps 1.12", "release_date": "2024-06-27T00:00:00Z"}, {"advisory": "RHSA-2024:4163", "cpe": "cpe:/a:redhat:openshift_gitops:1.12::el9", "package": "openshift-gitops-argocd-rhel9-container-v1.12.4-1", "product_name": "Red Hat OpenShift GitOps 1.12 - RHEL 9", "release_date": "2024-06-27T00:00:00Z"}], "bugzilla": {"description": "helm: Missing YAML Content Leads To Panic", "id": "2265440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265440"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "status": "verified"}, "cwe": "CWE-457", "details": ["Helm is a package manager for Charts for Kubernetes. Versions prior to 3.14.2 contain an uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content. When either an `index.yaml` file or a plugins `plugin.yaml` file were missing all metadata a panic would occur in Helm. In the Helm SDK, this is found when using the `LoadIndexFile` or `DownloadIndexFile` functions in the `repo` package or the `LoadDir` function in the `plugin` package. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation. This issue has been resolved in Helm v3.14.2. If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem. If using Helm SDK versions prior to 3.14.2, calls to affected functions can use `recover` to catch the panic.", "A vulnerability was found in Helm. This flaw may lead to a panic when Helm parses index and plugin yaml files missing expected content, leading to a denial of service."], "mitigation": {"lang": "en:us", "value": "If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem.\nIf using Helm SDK versions prior to 3.14.2, calls to affected functions can use recover to catch the panic."}, "name": "CVE-2024-26147", "package_state": [{"cpe": "cpe:/a:redhat:cert_manager:1", "fix_state": "Not affected", "package_name": "cert-manager/jetstack-cert-manager-rhel9", "product_name": "cert-manager Operator for Red Hat OpenShift"}, {"cpe": "cpe:/a:redhat:service_mesh:2", "fix_state": "Not affected", "package_name": "openshift-service-mesh/istio-cni-rhel8", "product_name": "OpenShift Service Mesh 2"}, {"cpe": "cpe:/a:redhat:service_mesh:2", "fix_state": "Not affected", "package_name": "openshift-service-mesh/istio-rhel8-operator", "product_name": "OpenShift Service Mesh 2"}, {"cpe": "cpe:/a:redhat:acm:2", "fix_state": "Not affected", "package_name": "rhacm2/acm-search-v2-rhel8", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2"}, {"cpe": "cpe:/a:redhat:acm:2", "fix_state": "Not affected", "package_name": "rhacm2/acm-volsync-addon-controller-rhel9", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2"}, {"cpe": "cpe:/a:redhat:acm:2", "fix_state": "Not affected", "package_name": "rhacm2/multiclusterhub-rhel8", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2"}, {"cpe": "cpe:/a:redhat:acm:2", "fix_state": "Affected", "package_name": "rhacm2/multicluster-operators-channel-rhel8", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2"}, {"cpe": "cpe:/a:redhat:acm:2", "fix_state": "Affected", "package_name": "rhacm2/multicluster-operators-subscription-rhel8", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2"}, {"cpe": "cpe:/a:redhat:acm:2", "fix_state": "Will not fix", "package_name": "rhacm2/submariner-rhel8-operator", "product_name": "Red Hat Advanced Cluster Management for Kubernetes 2"}, {"cpe": "cpe:/a:redhat:advanced_cluster_security:3", "fix_state": "Out of support scope", "package_name": "advanced-cluster-security/rhacs-main-rhel8", "product_name": "Red Hat Advanced Cluster Security 3"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Will not fix", "package_name": "openshift4/metallb-rhel8-operator", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Will not fix", "package_name": "openshift4/oc-mirror-plugin-rhel8", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "openshift4/ose-olm-rukpak-rhel8", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "openshift4/ose-operator-registry-rhel9", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Affected", "package_name": "openshift4/ose-operator-sdk-rhel8", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Will not fix", "package_name": "openshift4/special-resource-rhel8-operator", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "redhat/redhat-operator-index", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift_container_storage:4", "fix_state": "Out of support scope", "package_name": "ocs4/ocs-rhel8-operator", "product_name": "Red Hat Openshift Container Storage 4"}, {"cpe": "cpe:/a:redhat:openshift_container_storage:4", "fix_state": "Out of support scope", "package_name": "ocs4/rook-ceph-rhel8-operator", "product_name": "Red Hat Openshift Container Storage 4"}, {"cpe": "cpe:/a:redhat:openshift_data_foundation:4", "fix_state": "Not affected", "package_name": "odf4/odf-csi-addons-sidecar-rhel9", "product_name": "Red Hat Openshift Data Foundation 4"}, {"cpe": "cpe:/a:redhat:openshift_data_foundation:4", "fix_state": "Not affected", "package_name": "odf4/rook-ceph-rhel8-operator", "product_name": "Red Hat Openshift Data Foundation 4"}, {"cpe": "cpe:/a:redhat:container_native_virtualization:4", "fix_state": "Not affected", "package_name": "container-native-virtualization/cluster-network-addons-operator", "product_name": "Red Hat OpenShift Virtualization 4"}, {"cpe": "cpe:/a:redhat:container_native_virtualization:4", "fix_state": "Not affected", "package_name": "container-native-virtualization/cluster-network-addons-operator-rhel9", "product_name": "Red Hat OpenShift Virtualization 4"}, {"cpe": "cpe:/a:redhat:openstack:16.2", "fix_state": "Not affected", "package_name": "osp-director-provisioner-container", "product_name": "Red Hat OpenStack Platform 16.2"}], "public_date": "2024-02-22T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-26147\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26147\nhttps://github.com/helm/helm/security/advisories/GHSA-r53h-jv2g-vpx6"], "statement": "Red Hat rates this as Moderate since this would impact the Helm client and requires a malicious plugin to be in place, which can be removed.", "threat_severity": "Moderate"}