Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Argo Workflows Project
Argo Workflows Project argo Workflows |
|
CPEs | cpe:2.3:a:argo_workflows_project:argo_workflows:3.6.0:rc1:*:*:*:kubernetes:*:* | |
Vendors & Products |
Argo Workflows Project
Argo Workflows Project argo Workflows |
Tue, 29 Oct 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 28 Oct 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2. | |
Title | Argo Workflows Controller: Denial of Service via malicious daemon Workflows | |
Weaknesses | CWE-1108 CWE-362 |
|
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-28T15:10:55.772Z
Updated: 2024-10-28T15:10:55.772Z
Reserved: 2024-10-03T14:06:12.641Z
Link: CVE-2024-47827
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2024-10-28T16:15:03.990
Modified: 2024-11-05T16:50:27.330
Link: CVE-2024-47827
Redhat