kyverno seccomp control can be circumvented
Description
Published to the GitHub Advisory Database
May 25, 2023
Reviewed
May 25, 2023
Published by the National Vulnerability Database
May 30, 2023
Last updated
Nov 5, 2023
Impact
Users of the podSecurity (
validate.podSecurity
) subrule in Kyverno versions v1.9.2 and v1.9.3 may be unable to enforce the check for the Seccomp control at the baseline level when using aversion
value oflatest
. There is no effect if a version number is referenced instead. See the documentation for information on this subrule type. Users of Kyverno v1.9.2 and v1.9.3 are affected.Patches
v1.9.4
v1.10.0
Workarounds
To work around this issue without upgrading to v1.9.4, temporarily install individual policies for the respective Seccomp checks in baseline here and restricted here.
References
References