Ensure kernel level call configurations are not vulnerable to CVE-2022-0811 in all Kubernetes workloads

HIGH

Description

Allowing the creation of pods which makes use of kernel level calls using 'sysctl' with value including '+'/'=' makes your cluster vulnerable to CVE-2022-0811.

Remediation

Make sure your Kubernetes workload configuration's securityContext field does not have 'sysctls' argument and if required, verify it does not have any kernel level call specified with values = ['+', '='].

Policy Details

Rule Reference ID: AC_K8S_0125
Remediation Available: No
Resource: kubernetes_pod
Resource Category: Compute
Resource Type: Pod

Frameworks