Summary
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files and directories outside of the volume, including on the host filesystem. The vulnerability is caused by a symlink-exchange race condition in kubelet during subpath handling. Environments where cluster administrators have restricted the ability to create hostPath mounts are most seriously affected, because exploitation allows hostPath-like access without use of the hostPath feature, thereby bypassing the restriction.