{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"low"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2019-25210","title":"Title"},{"category":"description","text":"An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). Also, it is not the Helm Project's responsibility if a user decides to use --dry-run within a CI/CD environment whose output is visible to unauthorized persons.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2019-25210","url":"https://www.suse.com/security/cve/CVE-2019-25210"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1220823 for CVE-2019-25210","url":"https://bugzilla.suse.com/1220823"}],"title":"SUSE CVE CVE-2019-25210","tracking":{"current_release_date":"2025-07-08T00:18:35Z","generator":{"date":"2024-03-05T05:06:32Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2019-25210","initial_release_date":"2024-03-05T05:06:32Z","revision_history":[{"date":"2024-03-05T05:06:32Z","number":"2","summary":"Current version"},{"date":"2024-07-03T05:09:57Z","number":"3","summary":"Current version"},{"date":"2024-07-04T04:24:02Z","number":"4","summary":"Current version"},{"date":"2025-01-01T06:04:30Z","number":"5","summary":"Current version"},{"date":"2025-01-23T04:25:10Z","number":"6","summary":"Current version"},{"date":"2025-02-15T06:42:01Z","number":"7","summary":"Current version"},{"date":"2025-02-17T07:06:48Z","number":"8","summary":"Current version"},{"date":"2025-07-08T00:18:35Z","number":"9","summary":"Current version"}],"status":"interim","version":"9"}}}