[go: up one dir, main page]

Skip to content

Seccomp control can be circumvented when using validate.podSecurity subrule

Moderate
chipzoller published GHSA-33hq-f2mf-jm3c May 25, 2023

Package

No package listed

Affected versions

1.9.2-1.9.3

Patched versions

1.9.4

Description

Impact

Users of the podSecurity (validate.podSecurity) subrule in Kyverno versions v1.9.2 and v1.9.3 may be unable to enforce the check for the Seccomp control at the baseline level when using a version value of latest. There is no effect if a version number is referenced instead. See the documentation for information on this subrule type. Users of Kyverno v1.9.2 and v1.9.3 are affected.

Patches

v1.9.4
v1.10.0

Workarounds

To work around this issue without upgrading to v1.9.4, temporarily install individual policies for the respective Seccomp checks in baseline here and restricted here.

References

Severity

Moderate

CVE ID

CVE-2023-33191

Weaknesses

No CWEs