Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-10-21T00:00:00

Updated: 2024-08-03T12:00:43.351Z

Reserved: 2022-09-02T00:00:00

Link: CVE-2022-39272

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-10-22T00:15:09.310

Modified: 2024-11-21T07:17:55.753

Link: CVE-2022-39272

cve-icon Redhat

No data.