logo

CVE-2019-11245 k8s.io/kubernetes/cmd/kubelet

Package

Manager: go
Name: k8s.io/kubernetes/cmd/kubelet
Vulnerable Version: >=1.14.0 <1.14.3 || >=1.13.0 <1.13.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00173 pctl0.39109

Details

Kubelet Incorrect Privilege Assignment In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit `runAsUser` attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified `mustRunAsNonRoot: true`, the kubelet will refuse to start the container as root. If the pod did not specify `mustRunAsNonRoot: true`, the kubelet will run the container as uid 0.

Metadata

Created: 2024-04-24T20:03:48Z
Modified: 2024-06-10T19:33:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-r76g-g87f-vw8f/GHSA-r76g-g87f-vw8f.json
CWE IDs: ["CWE-266", "CWE-703"]
Alternative ID: GHSA-r76g-g87f-vw8f
Finding: F005
Auto approve: 1