CVE-2022-39272
Summary
| CVE | CVE-2022-39272 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-10-22 00:15:00 UTC |
| Updated | 2023-11-07 03:50:00 UTC |
| Description | Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation. |
Risk And Classification
Problem Types: CWE-1284
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Fluxcd | Flux2 | All | All | All | All |
| Application | Fluxcd | Helm-controller | All | All | All | All |
| Application | Fluxcd | Helm-controller | 0.0.1 | alpha1 | All | All |
| Application | Fluxcd | Helm-controller | 0.0.1 | alpha2 | All | All |
| Application | Fluxcd | Helm-controller | 0.0.1 | beta1 | All | All |
| Application | Fluxcd | Helm-controller | 0.0.1 | beta2 | All | All |
| Application | Fluxcd | Helm-controller | 0.0.1 | beta3 | All | All |
| Application | Fluxcd | Helm-controller | 0.0.1 | beta4 | All | All |
| Application | Fluxcd | Image-automation-controller | All | All | All | All |
| Application | Fluxcd | Image-reflector-controller | All | All | All | All |
| Application | Fluxcd | Kustomize-controller | All | All | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha1 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha2 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha3 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha4 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha5 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha6 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha7 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha8 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | alpha9 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | beta1 | All | All |
| Application | Fluxcd | Kustomize-controller | 0.0.1 | beta2 | All | All |
| Application | Fluxcd | Notification-controller | All | All | All | All |
| Application | Fluxcd | Notification-controller | 0.0.1 | alpha1 | All | All |
| Application | Fluxcd | Notification-controller | 0.0.1 | alpha2 | All | All |
| Application | Fluxcd | Notification-controller | 0.0.1 | beta1 | All | All |
| Application | Fluxcd | Source-controller | All | All | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | alpha1 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | alpha2 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | alpha3 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | alpha4 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | alpha5 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | alpha6 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | beta1 | All | All |
| Application | Fluxcd | Source-controller | 0.0.1 | beta2 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Improper use of metav1.Duration allows for Denial of Service · Advisory · fluxcd/flux2 · GitHub | CONFIRM | github.com | |
| metav1.Duration doesn't parse `d`, `w`; conflicts with kubebuilder `format=duration` validation · Issue #131 · kubernetes/apimachinery · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.