Lucene search

K
nvd[email protected]NVD:CVE-2022-39272
HistoryOct 22, 2022 - 12:15 a.m.

CVE-2022-39272

2022-10-2200:15:09
CWE-1284
web.nvd.nist.gov
flux
kubernetes
denial of service
cve-2022-39272
admission controllers
permissions

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

0.001 Low

EPSS

Percentile

33.0%

Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields .spec.interval or .spec.timeout (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields .spec.interval and .spec.timeout, however upgrading to the latest versions is still the recommended mitigation.

Affected configurations

NVD
Node
fluxcdflux2Range0.1.00.35.0
OR
fluxcdhelm-controllerRange0.0.20.24.0
OR
fluxcdhelm-controllerMatch0.0.1alpha1
OR
fluxcdhelm-controllerMatch0.0.1alpha2
OR
fluxcdhelm-controllerMatch0.0.1beta1
OR
fluxcdhelm-controllerMatch0.0.1beta2
OR
fluxcdhelm-controllerMatch0.0.1beta3
OR
fluxcdhelm-controllerMatch0.0.1beta4
OR
fluxcdimage-automation-controllerRange0.1.00.26.0
OR
fluxcdimage-reflector-controllerRange0.1.00.22.0
OR
fluxcdkustomize-controllerRange0.0.20.29.0
OR
fluxcdkustomize-controllerMatch0.0.1alpha1
OR
fluxcdkustomize-controllerMatch0.0.1alpha2
OR
fluxcdkustomize-controllerMatch0.0.1alpha3
OR
fluxcdkustomize-controllerMatch0.0.1alpha4
OR
fluxcdkustomize-controllerMatch0.0.1alpha5
OR
fluxcdkustomize-controllerMatch0.0.1alpha6
OR
fluxcdkustomize-controllerMatch0.0.1alpha7
OR
fluxcdkustomize-controllerMatch0.0.1alpha8
OR
fluxcdkustomize-controllerMatch0.0.1alpha9
OR
fluxcdkustomize-controllerMatch0.0.1beta1
OR
fluxcdkustomize-controllerMatch0.0.1beta2
OR
fluxcdnotification-controllerRange0.0.20.27.0
OR
fluxcdnotification-controllerMatch0.0.1alpha1
OR
fluxcdnotification-controllerMatch0.0.1alpha2
OR
fluxcdnotification-controllerMatch0.0.1beta1
OR
fluxcdsource-controllerRange0.0.20.30.0
OR
fluxcdsource-controllerMatch0.0.1alpha1
OR
fluxcdsource-controllerMatch0.0.1alpha2
OR
fluxcdsource-controllerMatch0.0.1alpha3
OR
fluxcdsource-controllerMatch0.0.1alpha4
OR
fluxcdsource-controllerMatch0.0.1alpha5
OR
fluxcdsource-controllerMatch0.0.1alpha6
OR
fluxcdsource-controllerMatch0.0.1beta1
OR
fluxcdsource-controllerMatch0.0.1beta2

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

0.001 Low

EPSS

Percentile

33.0%