{"containers":{"cna":{"affected":[{"product":"Kubernetes","vendor":"Kubernetes","versions":[{"status":"affected","version":"v1.13.6"},{"status":"affected","version":"v1.14.2"}]}],"datePublic":"2019-05-24T00:00:00.000Z","descriptions":[{"lang":"en","value":"In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0."}],"metrics":[{"cvssV3_0":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-703","description":"CWE-703: Improper Check or Handling of Exceptional Conditions","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-09-19T16:06:08.000Z","orgId":"a6081bf6-c852-4425-ad4f-a67919267565","shortName":"kubernetes"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/kubernetes/kubernetes/issues/78308"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20190919-0003/"}],"source":{"defect":["https://github.com/kubernetes/kubernetes/issues/78308"],"discovery":"USER"},"title":"kubelet-started container uid changes to root after first restart or if image is already pulled to the node","workarounds":[{"lang":"en","value":"Specify runAsUser directives in pods to control the uid a container runs as. Specify mustRunAsNonRoot:true directives in pods to prevent starting as root (note this means the attempt to start the container will fail on affected kubelet versions)."}],"x_generator":{"engine":"Vulnogram 0.0.7"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"","ASSIGNER":"security@kubernetes.io","DATE_PUBLIC":"2019-05-24","ID":"CVE-2019-11245","STATE":"PUBLIC","TITLE":"kubelet-started container uid changes to root after first restart or if image is already pulled to the node"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Kubernetes","version":{"version_data":[{"platform":"","version_affected":"=","version_name":"v1.13","version_value":"v1.13.6"},{"platform":"","version_affected":"=","version_name":"v1.14","version_value":"v1.14.2"}]}}]},"vendor_name":"Kubernetes"}]}},"configuration":[],"credit":[],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not specify mustRunAsNonRoot: true, the kubelet will run the container as uid 0."}]},"exploit":[],"generator":{"engine":"Vulnogram 0.0.7"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-703: Improper Check or Handling of Exceptional Conditions"}]}]},"references":{"reference_data":[{"name":"https://github.com/kubernetes/kubernetes/issues/78308","refsource":"CONFIRM","url":"https://github.com/kubernetes/kubernetes/issues/78308"},{"name":"https://security.netapp.com/advisory/ntap-20190919-0003/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20190919-0003/"}]},"solution":[],"source":{"advisory":"","defect":["https://github.com/kubernetes/kubernetes/issues/78308"],"discovery":"USER"},"work_around":[{"lang":"en","value":"Specify runAsUser directives in pods to control the uid a container runs as. Specify mustRunAsNonRoot:true directives in pods to prevent starting as root (note this means the attempt to start the container will fail on affected kubelet versions)."}]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T22:48:09.001Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/kubernetes/kubernetes/issues/78308"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20190919-0003/"}]}]},"cveMetadata":{"assignerOrgId":"a6081bf6-c852-4425-ad4f-a67919267565","assignerShortName":"kubernetes","cveId":"CVE-2019-11245","datePublished":"2019-08-29T00:22:24.173Z","dateReserved":"2019-04-17T00:00:00.000Z","dateUpdated":"2024-09-16T22:09:44.877Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}