Source |
CVE Liste |
Identifiant |
7622020 |
Date de publication |
2022-10-22 00:15:09 (vue: 2022-10-22 06:06:54) |
Titre |
CVE-2022-39272 |
Texte |
Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation. |
Envoyé |
Oui |
Condensat |
2022 39272 admission are being can causing change cluster continuous controllers cve data delivery denial directly either employed entire extensible fields flux fluxã¢â‚¬â„¢s have however interval` invalid issue kubernetes latest mitigation object objects open patched permissions prior processed provide recommended restrict service solution source spec stop structured subject these through timeout` type upgrading used users values variations version versions within workaround |
Tags |
|
Stories |
Uber
|
Notes |
|
Move |
|