Insecure Permissions Affecting k8s.io/kubernetes/pkg/kubelet/kuberuntime package, versions >=1.14.0 <1.14.3>=1.13.0 <1.13.7


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insecure Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-K8SIOKUBERNETESPKGKUBELETKUBERUNTIME-174842
  • published25 May 2019
  • disclosed25 May 2019
  • creditDhananjay Arunesh

Introduced: 25 May 2019

CVE-2019-11245  (opens in a new tab)
CWE-266  (opens in a new tab)

How to fix?

Upgrade k8s.io/kubernetes/pkg/kubelet/kuberuntime to version 1.14.3, 1.13.7 or higher.

Overview

k8s.io/kubernetes/pkg/kubelet/kuberuntime is a package that contains an implementation of kubecontainer.

Affected versions of this package are vulnerable to Insecure Permissions. Containers for pods that do not specify an explicit runAsUser will attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. This behaviour also occurs if mustRunAsNonRoot: true setting is used.

CVSS Scores

version 3.1