First published: Wed Apr 10 2024(Updated: )
Errata Advisory for Red Hat OpenShift GitOps v1.12.1.<br>Security Fix(es):<br><li> argo-cd: Denial of Service Due to Unsafe Array Modification in Multi-threaded Environment (CVE-2024-21661)</li> <li> argo-cd: Users with `create` but not `override` privileges can perform local sync (CVE-2023-50726)</li> <li> argo-cd: Bypassing Brute Force Protection via Application Crash and In-Memory Data Loss (CVE-2024-21652)</li> <li> argo-cd: uncontrolled resource consumption vulnerability (CVE-2024-29893)</li> <li> argo-cd: Bypassing Rate Limit and Brute Force Protection Using Cache Overflow (CVE-2024-21662)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenShift GitOps for ARM 64 | ||
Red Hat Red Hat OpenShift GitOps | ||
Red Hat Red Hat OpenShift GitOps for IBM Power, little endian | ||
Red Hat Red Hat OpenShift GitOps for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:1753 addresses a denial of service vulnerability rated as critical due to unsafe array modification in a multi-threaded environment.
To fix RHSA-2024:1753, upgrade to the latest version of Red Hat OpenShift GitOps as specified in the advisory.
RHSA-2024:1753 affects various versions of Red Hat OpenShift GitOps, including ARM 64 and IBM Power platforms.
RHSA-2024:1753 includes vulnerabilities such as denial of service and privilege escalation affecting Argo CD.
There are no documented workarounds for RHSA-2024:1753; applying the necessary updates is the recommended action.