Hide Forgot
All versions of Argo CD starting with v0.7.0 are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server <https://argo-cd.readthedocs.io/en/stable/operator-manual/architecture/#repository-server> service. The repo-server is a critical component of Argo CD, so crashing the repo-server effectively denies core Argo CD services (such as syncing Application updates). To achieve denial of service, the attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. <https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhqp-vf4w-rpwq>
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.5 Via RHSA-2022:5152 https://access.redhat.com/errata/RHSA-2022:5152
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.4 Via RHSA-2022:5153 https://access.redhat.com/errata/RHSA-2022:5153
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:5192 https://access.redhat.com/errata/RHSA-2022:5192
This issue has been addressed in the following products: Red Hat OpenShift GitOps 1.3 Via RHSA-2022:5187 https://access.redhat.com/errata/RHSA-2022:5187
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-31016