{"id":"CVE-2021-3101","details":"Hotdog, prior to v1.0.1, did not mimic the capabilities or the SELinux label of the target JVM process. This would allow a container to gain full privileges on the host, bypassing restrictions set on the container.","modified":"2026-03-13T22:14:05.145799Z","published":"2022-04-19T23:15:13.107Z","related":["GHSA-qfhv-c5cc-mhgp"],"references":[{"type":"ADVISORY","url":"https://github.com/bottlerocket-os/hotdog/security/advisories/GHSA-qfhv-c5cc-mhgp"},{"type":"FIX","url":"https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bottlerocket-os/hotdog","events":[{"introduced":"0"},{"fixed":"3f2ca9275fae8db87409c3a0999aa2c8a4bd44d1"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.1"}]}}],"versions":["v1.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3101.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}