{"id":"CVE-2019-10145","details":"rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.","modified":"2026-04-10T04:14:09.002212Z","published":"2019-06-03T19:29:01.813Z","references":[{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10145"},{"type":"EVIDENCE","url":"https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rkt/rkt","events":[{"introduced":"0"},{"last_affected":"e04dd994baa1051f1205578d12d69eec83dbb905"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.30.0"}]}}],"versions":["v0.0.0","v0.1.0","v0.1.1","v0.4.1","v0.5.5","v1.18.0","v1.30.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10145.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H"}]}