Vulnerability Description
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Rkt | <= 1.30.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145Issue TrackingThird Party Advisory
- https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/ExploitThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145Issue TrackingThird Party Advisory
- https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/ExploitThird Party Advisory
FAQ
What is CVE-2019-10145?
CVE-2019-10145 is a vulnerability with a CVSS score of 7.7 (HIGH). rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment i...
How severe is CVE-2019-10145?
CVE-2019-10145 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10145?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Rkt.