CVE-2024-29893

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-29893
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-29893.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-29893
Aliases
Downstream
Related
Published
2024-03-29T15:07:51Z
Modified
2025-10-15T09:21:05.167614Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Uncontrolled Resource Consumption vulnerability in ArgoCD's repo server
Details

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, it's possible to crash the repo server component through an out of memory error by pointing it to a malicious Helm registry. The loadRepoIndex() function in the ArgoCD's helm package, does not limit the size nor time while fetching the data. It fetches it and creates a byte slice from the retrieved data in one go. If the registry is implemented to push data continuously, the repo server will keep allocating memory until it runs out of it. A patch for this vulnerability has been released in v2.10.3, v2.9.8, and v2.8.12.

References

Affected packages

Git / github.com/argoproj/argo-cd

Affected ranges

Type
GIT
Repo
https://github.com/argoproj/argo-cd
Events
Type
GIT
Repo
https://github.com/argoproj/argo-cd
Events
Type
GIT
Repo
https://github.com/argoproj/argo-cd
Events

Affected versions

v2.*

v2.10.0
v2.10.1
v2.10.2
v2.10.3
v2.10.4