rkt through version 1.30.0 does not isolate processes in containers that are run with rkt enter
. Processes run with rkt enter
are not limited by cgroups during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rkt | Redhat | * | 1.30.0 (including) |
Rkt | Ubuntu | bionic | * |
Rkt | Ubuntu | cosmic | * |
Rkt | Ubuntu | disco | * |
Rkt | Ubuntu | eoan | * |
Rkt | Ubuntu | focal | * |
Rkt | Ubuntu | groovy | * |
Rkt | Ubuntu | trusty | * |