rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
References
Link | Resource |
---|---|
https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/ | Exploit Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2019-06-03 12:29
Updated : 2020-10-02 07:35
NVD link : CVE-2019-10145
Mitre link : CVE-2019-10145
JSON object : View
CWE
CWE-862
Missing Authorization
Products Affected
redhat
- rkt