Vulnerability Description
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Argoproj | Argo Workflows | 3.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/argoproj/argo-workflows/blob/ce7f9bfb9b45f009b3e85fabe5e6410dProduct
- https://github.com/argoproj/argo-workflows/commit/524406451f4dfa57bf3371fb85becdPatch
- https://github.com/argoproj/argo-workflows/pull/13641Issue TrackingPatch
- https://github.com/argoproj/argo-workflows/security/advisories/GHSA-ghjw-32xw-ffVendor Advisory
FAQ
What is CVE-2024-47827?
CVE-2024-47827 is a vulnerability with a CVSS score of 5.7 (MEDIUM). Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controlle...
How severe is CVE-2024-47827?
CVE-2024-47827 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-47827?
Check the references section above for vendor advisories and patch information. Affected products include: Argoproj Argo Workflows.