Linux CVE-2022-0185 can allow a container escape in Kubernetes if left unpatched. The affected Linux kernel versions, at this time, are 5.10.84-1 and 5.15.5-2. For more information, refer to https://security-tracker.debian.org/tracker/CVE-2022-0185. This policy runs in background mode and flags an entry in the ClusterPolicyReport if any Node is reporting one of the affected kernel versions.
apiVersion: kyverno.io/v1kind: ClusterPolicymetadata:name: check-kernelannotations:policies.kyverno.io/title: Check Node for CVE-2022-0185 in CEL expressionspolicies.kyverno.io/category: Other in CELpolicies.kyverno.io/severity: highkyverno.io/kyverno-version: 1.11.0policies.kyverno.io/minversion: 1.11.0kyverno.io/kubernetes-version: 1.26-1.27policies.kyverno.io/subject: Nodepolicies.kyverno.io/description: Linux CVE-2022-0185 can allow a container escape in Kubernetes if left unpatched. The affected Linux kernel versions, at this time, are 5.10.84-1 and 5.15.5-2. For more information, refer to https://security-tracker.debian.org/tracker/CVE-2022-0185. This policy runs in background mode and flags an entry in the ClusterPolicyReport if any Node is reporting one of the affected kernel versions.spec:validationFailureAction: Auditbackground: truerules:- name: kernel-validatematch:any:- resources:kinds:- Nodeoperations:- CREATE- UPDATEvalidate:cel:expressions:- expression: "!(object.status.nodeInfo.kernelVersion in ['5.10.84-1', '5.15.5-2'])"message: Kernel is vulnerable to CVE-2022-0185.
This policy prevents the use of the default project in an Application.
This policy prevents updates to the project field after an Application is created.
This policy ensures that the name of the ApplicationSet is the same value provided in the project.