Container is running with custom SELinux options Affecting Deployment service in Kubernetes


Severity

0.0
low
0
10
    Severity Framework
    Snyk CCSS
    Rule category
    Containers / Best Practices

Is your enviroment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
    Frameworks
    CIS-Controls
  • Snyk ID SNYK-CC-00620
  • credit Snyk Research Team

Description

SELinux mandatory access controls may be bypassed, due to clashes in labeling.

How to fix?

Remove securityContext.seLinuxOptions.

Terraform