Skip to content

Kubelet Incorrect Privilege Assignment

Moderate severity GitHub Reviewed Published Apr 24, 2024 to the GitHub Advisory Database • Updated Apr 24, 2024

Package

gomod k8s.io/kubernetes/cmd/kubelet (Go)

Affected versions

>= 1.14.0, < 1.14.3
>= 1.13.0, < 1.13.7

Patched versions

1.14.3
1.13.7

Description

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

References

Published to the GitHub Advisory Database Apr 24, 2024
Reviewed Apr 24, 2024
Last updated Apr 24, 2024

Severity

Moderate
4.9
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVE ID

CVE-2019-11245

GHSA ID

GHSA-r76g-g87f-vw8f

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.