CVE-2019-10144 | Date: (C)2019-06-24 (M)2023-12-22 |
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 7.7 | CVSS Score : 6.9 |
Exploit Score: 1.1 | Exploit Score: 3.4 |
Impact Score: 6.0 | Impact Score: 10.0 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: LOCAL | Access Vector: LOCAL |
Attack Complexity: LOW | Access Complexity: MEDIUM |
Privileges Required: HIGH | Authentication: NONE |
User Interaction: REQUIRED | Confidentiality: COMPLETE |
Scope: CHANGED | Integrity: COMPLETE |
Confidentiality: HIGH | Availability: COMPLETE |
Integrity: HIGH | |
Availability: HIGH | |
| |