CVE-2019-18658
Description
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In Helm 2.x before 2.15.2, a malicious chart can include sensitive local files or cause denial of service via symlinks when loading a chart from a directory or packaging.
The vulnerability resides in the Helm 2.x client versions prior to 2.15.2. When processing chart directories or packaging charts, the client follows symbolic links (symlinks) present in the chart. An attacker can craft a chart that includes symlinks pointing to sensitive local files such as /etc/passwd or to special files like /dev/urandom. This allows the client to inadvertently read and include the contents of those files [1].
Exploitation requires no authentication; an attacker simply supplies a malicious chart to a victim. If the victim runs commands such as helm package, helm lint, or any operation that loads a chart from a directory, the client will follow the symlinks. The victim's machine processes the chart, potentially exposing sensitive data or hanging indefinitely due to blocking reads from /dev/urandom [1].
The impact is twofold: information disclosure of sensitive system files and denial of service. This vulnerability does not affect the Tiller server component; it is purely client-side. Any user who processes untrusted charts is at risk [1].
Mitigation is straightforward: upgrade to Helm version 2.15.2 or later. There is no known workaround other than avoiding untrusted charts. The issue is fixed in the referenced release [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
helm.sh/helmGo | >= 2.0.0, < 2.15.2 | 2.15.2 |
Affected products
7- Helm/Helmdescription
- ghsa-coords6 versionspkg:golang/helm.sh/helmpkg:rpm/opensuse/helm-mirror&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/helm-mirror&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/helm-mirror&distro=openSUSE%20Tumbleweedpkg:rpm/suse/helm-mirror&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP3pkg:rpm/suse/helm-mirror&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP4
>= 2.0.0, < 2.15.2+ 5 more
- (no CPE)range: >= 2.0.0, < 2.15.2
- (no CPE)range: < 0.3.1-150000.1.13.1
- (no CPE)range: < 0.3.1-150000.1.13.1
- (no CPE)range: < 0.3.1-1.9
- (no CPE)range: < 0.3.1-150000.1.13.1
- (no CPE)range: < 0.3.1-150000.1.13.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-p5pc-m4q7-7qm9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-18658ghsaADVISORY
- helm.sh/blog/2019-10-30-helm-symlink-security-noticeghsaWEB
- helm.sh/blog/2019-10-30-helm-symlink-security-notice/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.