Описание
rkt through version 1.30.0 does not isolate processes in containers that are run with rkt enter. Processes run with rkt enter are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
Ссылки
- Issue TrackingThird Party Advisory
- ExploitThird Party Advisory
- Issue TrackingThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
EPSS
7 High
CVSS3
7.7 High
CVSS3
6.9 Medium
CVSS2
Дефекты
Связанные уязвимости
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
rkt through version 1.30.0 does not isolate processes in containers th ...
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
EPSS
7 High
CVSS3
7.7 High
CVSS3
6.9 Medium
CVSS2