CVE-2019-10144

high

Description

rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.

References

https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144

Details

Source: Mitre, NVD

Published: 2019-06-03

Updated: 2020-09-30

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.7

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00037