{"id":"CVE-2022-39272","summary":"Flux2 vulnerable to Denial of Service due to Improper use of metav1.Duration","details":"Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.","aliases":["BIT-flux-2022-39272","BIT-kustomize-2022-39272","GHSA-f4p5-x4vc-mh4v","GO-2022-1071"],"modified":"2026-04-10T04:50:19.796398Z","published":"2022-10-21T00:00:00Z","related":["CGA-hwg5-22j5-jjq4"],"database_specific":{"cwe_ids":["CWE-1284"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39272.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39272.json"},{"type":"ADVISORY","url":"https://github.com/fluxcd/flux2/security/advisories/GHSA-f4p5-x4vc-mh4v"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39272"},{"type":"REPORT","url":"https://github.com/kubernetes/apimachinery/issues/131"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fluxcd/flux2","events":[{"introduced":"b7727e2659d2476312abdb43f7c9df0f64bfa0e0"},{"fixed":"1bf63a94c22d1b9b7ccf92f66a1a34a74bd72fca"}]}],"versions":["v0.0.10","v0.0.11","v0.0.12","v0.0.13","v0.0.14","v0.0.15","v0.0.16","v0.0.17","v0.0.18","v0.0.19","v0.0.2","v0.0.20","v0.0.21","v0.0.22","v0.0.23","v0.0.24","v0.0.25","v0.0.26","v0.0.27","v0.0.28","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.1.5","v0.1.6","v0.1.7","v0.1.8","v0.10.0","v0.11.0","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.13.1","v0.13.2","v0.13.3","v0.13.4","v0.14.0","v0.14.1","v0.14.2","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.16.0","v0.16.1","v0.16.2","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.18.1","v0.18.2","v0.18.3","v0.19.0","v0.19.1","v0.2.0","v0.2.1","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.20.0","v0.20.1","v0.21.0","v0.21.1","v0.22.0","v0.22.1","v0.23.0","v0.24.0","v0.24.1","v0.25.0","v0.25.1","v0.25.2","v0.25.3","v0.26.0","v0.26.1","v0.26.2","v0.26.3","v0.27.0","v0.27.1","v0.27.2","v0.28.0","v0.28.1","v0.28.2","v0.28.3","v0.28.4","v0.28.5","v0.29.0","v0.29.1","v0.29.2","v0.29.3","v0.29.4","v0.29.5","v0.3.0","v0.30.0","v0.30.1","v0.30.2","v0.31.0","v0.31.1","v0.31.2","v0.31.3","v0.31.4","v0.31.5","v0.32.0","v0.33.0","v0.34.0","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6","v0.7.7","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39272.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"}]}