Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. The fix for this vulnerability is available in versions 2.3.5, 2.2.10, 2.1.16, and later. There are no known workarounds. Users are recommended to upgrade.
References
Link | Resource |
---|---|
https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhqp-vf4w-rpwq | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Aug 2024, 15:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Argoproj
Argoproj argo Cd |
|
CPE | cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:* |
21 Jul 2023, 17:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-770 |
Information
Published : 2022-06-25 08:15
Updated : 2024-08-07 15:43
NVD link : CVE-2022-31016
Mitre link : CVE-2022-31016
CVE.ORG link : CVE-2022-31016
JSON object : View
Products Affected
argoproj
- argo_cd