We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47827

Argo Workflows Controller: Denial of Service via malicious daemon Workflows



Description

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2.

Reserved 2024-10-03 | Published 2024-10-28 | Updated 2024-10-28 | Assigner GitHub_M


MEDIUM: 5.7CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-1108: Excessive Reliance on Global Variables

Product status

>= 3.6.0-rc1, < 3.6.0-rc2
affected

References

github.com/...kflows/security/advisories/GHSA-ghjw-32xw-ffwr

github.com/argoproj/argo-workflows/pull/13641

github.com/...ommit/524406451f4dfa57bf3371fb85becdb56a2b309a

github.com/...3c7c5f/workflow/metrics/metrics_k8s_request.go

cve.org (CVE-2024-47827)

nvd.nist.gov (CVE-2024-47827)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47827

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.