GHSA-r76g-g87f-vw8f
GitHub Security Advisory
Kubelet Incorrect Privilege Assignment
✓ GitHub Reviewed
MODERATE
Has CVE
Advisory Details
In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit `runAsUser` attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified `mustRunAsNonRoot: true`, the kubelet will refuse to start the container as root. If the pod did not specify `mustRunAsNonRoot: true`, the kubelet will run the container as uid 0.
Affected Packages
Go
k8s.io/kubernetes/cmd/kubelet
Affected versions:
1.14.0
(fixed in 1.14.3)
Go
k8s.io/kubernetes/cmd/kubelet
Affected versions:
1.13.0
(fixed in 1.13.7)
Related CVEs
Key Information
5.0
/10
Dataset
Last updated: September 16, 2025 6:29 AM
Data from GitHub Advisory Database. This information is provided for research and educational purposes.