5

CVE-2022-39272

Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FluxcdFlux2 Version >= 0.1.0 < 0.35.0
FluxcdHelm-controller Version >= 0.0.2 < 0.24.0
FluxcdHelm-controller Version0.0.1 Updatealpha1
FluxcdHelm-controller Version0.0.1 Updatealpha2
FluxcdHelm-controller Version0.0.1 Updatebeta1
FluxcdHelm-controller Version0.0.1 Updatebeta2
FluxcdHelm-controller Version0.0.1 Updatebeta3
FluxcdHelm-controller Version0.0.1 Updatebeta4
FluxcdImage-automation-controller Version >= 0.1.0 < 0.26.0
FluxcdImage-reflector-controller Version >= 0.1.0 < 0.22.0
FluxcdKustomize-controller Version >= 0.0.2 < 0.29.0
FluxcdKustomize-controller Version0.0.1 Updatealpha1
FluxcdKustomize-controller Version0.0.1 Updatealpha2
FluxcdKustomize-controller Version0.0.1 Updatealpha3
FluxcdKustomize-controller Version0.0.1 Updatealpha4
FluxcdKustomize-controller Version0.0.1 Updatealpha5
FluxcdKustomize-controller Version0.0.1 Updatealpha6
FluxcdKustomize-controller Version0.0.1 Updatealpha7
FluxcdKustomize-controller Version0.0.1 Updatealpha8
FluxcdKustomize-controller Version0.0.1 Updatealpha9
FluxcdKustomize-controller Version0.0.1 Updatebeta1
FluxcdKustomize-controller Version0.0.1 Updatebeta2
FluxcdNotification-controller Version >= 0.0.2 < 0.27.0
FluxcdNotification-controller Version0.0.1 Updatealpha1
FluxcdNotification-controller Version0.0.1 Updatealpha2
FluxcdNotification-controller Version0.0.1 Updatebeta1
FluxcdSource-controller Version >= 0.0.2 < 0.30.0
FluxcdSource-controller Version0.0.1 Updatealpha1
FluxcdSource-controller Version0.0.1 Updatealpha2
FluxcdSource-controller Version0.0.1 Updatealpha3
FluxcdSource-controller Version0.0.1 Updatealpha4
FluxcdSource-controller Version0.0.1 Updatealpha5
FluxcdSource-controller Version0.0.1 Updatealpha6
FluxcdSource-controller Version0.0.1 Updatebeta1
FluxcdSource-controller Version0.0.1 Updatebeta2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.31% 0.537
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
security-advisories@github.com 5 3.1 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
CWE-1284 Improper Validation of Specified Quantity in Input

The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.