CVE-2019-10144 (NVD)

2019-06-03

rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.

Products Rkt
Type Permissions, Privileges, and Access Controls (CWE-264)
First patch - None (likely due to unavailable code)
Links https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144