Insecure Permissions Affecting github.com/kubernetes/kubernetes/pkg/kubelet/kuberuntime package, versions >=1.14.0 <1.14.3 >=1.13.0 <1.13.7
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMKUBERNETESKUBERNETESPKGKUBELETKUBERUNTIME-174841
- published 25 May 2019
- disclosed 25 May 2019
- credit Dhananjay Arunesh
Introduced: 25 May 2019
CVE-2019-11245 Open this link in a new tabHow to fix?
Upgrade github.com/kubernetes/kubernetes/pkg/kubelet/kuberuntime
to version 1.14.3, 1.13.7 or higher.
Overview
github.com/kubernetes/kubernetes/pkg/kubelet/kuberuntime is a package that contains an implementation of kubecontainer.
Affected versions of this package are vulnerable to Insecure Permissions. Containers for pods that do not specify an explicit runAsUser
will attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. This behaviour also occurs if mustRunAsNonRoot: true
setting is used.
References
CVSS Scores
version 3.1