Vulnerabilities
Vulnerable Software
Redhat:  >> Rkt  Security Vulnerabilities
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
CVSS Score
7.0
EPSS Score
0.0
Published
2019-06-03
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
CVSS Score
7.0
EPSS Score
0.0
Published
2019-06-03
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are not limited by cgroups during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
CVSS Score
4.7
EPSS Score
0.0
Published
2019-06-03


Contact Us

Shodan ® - All rights reserved