Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11245

Опубликовано: 24 мая 2019
Источник: redhat
CVSS3: 4.9
EPSS Низкий

Описание

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

Отчет

This vulnerability only affects upstream Kubernetes versions 1.13.6 and 1.14.2. All released versions of Red Hat OpenShift Container Platform and Red Hat Gluster Storage 3 are not affected by this flaw as they do not contain the vulnerable code.

Меры по смягчению последствий

There are two potential mitigations to this issue:

  1. Downgrade to kubelet v1.13.5 or v1.14.1 as instructed by your Kubernetes distribution.
  2. Set RunAsUser on all pods in the cluster that should not run as root. This is a Security Context feature; the docs are at https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.11atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.6atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.7atomic-openshiftNot affected
Red Hat OpenShift Container Platform 3.9atomic-openshiftNot affected
Red Hat OpenShift Container Platform 4openshiftNot affected
Red Hat Storage 3heketiNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=1715726kubernetes: container uid changes to root after first restart

EPSS

Процентиль: 39%
0.00173
Низкий

4.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.9
ubuntu
почти 6 лет назад

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS3: 4.9
nvd
почти 6 лет назад

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0.

CVSS3: 4.9
debian
почти 6 лет назад

In kubelet v1.13.6 and v1.14.2, containers for pods that do not specif ...

CVSS3: 4.9
github
около 1 года назад

Kubelet Incorrect Privilege Assignment

EPSS

Процентиль: 39%
0.00173
Низкий

4.9 Medium

CVSS3