First published: Fri May 24 2019(Updated: )
In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit `runAsUser` attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified `mustRunAsNonRoot: true`, the kubelet will refuse to start the container as root. If the pod did not specify `mustRunAsNonRoot: true`, the kubelet will run the container as uid 0.
Credit: jordan@liggitt.net jordan@liggitt.net
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Kubernetes | =1.13.6 | |
Kubernetes Kubernetes | =1.14.2 | |
go/k8s.io/kubernetes/cmd/kubelet | >=1.13.0<1.13.7 | 1.13.7 |
go/k8s.io/kubernetes/cmd/kubelet | >=1.14.0<1.14.3 | 1.14.3 |
redhat/kubernetes | <1.13.7 | 1.13.7 |
redhat/kubernetes | <1.14.3 | 1.14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11245 is a vulnerability in kubelet versions 1.13.6 and 1.14.2 that allows containers to run as root even if the pod specifies mustRunAsNonRoot: true.
CVE-2019-11245 has a severity rating of 7.8 (high).
Kubernetes versions 1.13.6 and 1.14.2 are affected by CVE-2019-11245.
To fix CVE-2019-11245, upgrade to a version of kubelet that is not affected (e.g., versions higher than 1.14.2).
Yes, you can find references for CVE-2019-11245 at the following links: [link1] [link2]