NIXPKGS-2026-1267
GitHub issue
published on
Permalink
CVE-2026-41485
7.7 HIGH
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): Low (L)
- User Interaction (UI): None (N)
- Scope (S): Changed (C)
- Confidentiality (C): None (N)
- Integrity (I): None (N)
- Availability (A): High (H)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): Low (L)
- Modified Privileges Required (MPR): Low (L)
- Modified User Interaction (MUI): None (N)
- Modified Confidentiality (MC): None (N)
- Modified Scope (MS): Changed (C)
- Modified Integrity (MI): None (N)
- Modified Availability (MA): High (H)
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored package kyverno-chainsaw
- @LeSuisse accepted
- @LeSuisse published on GitHub
Kyverno Controller Denial of Service via forEach Mutation Panic
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.17.2 and 1.16.4, an unchecked type assertion in the `forEach` mutation handler allows any user with permission to create a `Policy` or `ClusterPolicy` to crash the cluster-wide background controller into a persistent CrashLoopBackOff. The same bug also causes the admission controller to drop connections and block all matching resource operations. The crash loop persists until the policy is deleted. The vulnerability is confined to the legacy engine, and CEL-based policies are unaffected. Versions 1.17.2 and 1.16.4 fix the issue.
References
-
https://github.com/kyverno/kyverno/security/advisories/GHSA-fpjq-c37h-cqcv x_refsource_CONFIRMexploit
Ignored references (1)
Affected products
kyverno
- ==>= 1.17.0-rc1, < 1.17.2
- ==< 1.16.4
Matching in nixpkgs
Package maintainers
-
@Scrumplex Sefa Eyeoglu <contact@scrumplex.net>
-
@LorenzBischof Lorenz Bischof <nix@lorenzbischof.ch>