rkt through version 1.30.0 does not isolate processes in containers that are run with rkt enter. Processes run with rkt enter are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Rkt | Redhat | * | 1.30.0 (including) |
| Rkt | Ubuntu | bionic | * |
| Rkt | Ubuntu | cosmic | * |
| Rkt | Ubuntu | disco | * |
| Rkt | Ubuntu | eoan | * |
| Rkt | Ubuntu | focal | * |
| Rkt | Ubuntu | groovy | * |
| Rkt | Ubuntu | trusty | * |