rkt is vulnerable to privilege escalation. An attacker with superuser previlage can exploit vulnerabilties in order to compromise a host when a user enters the kt rkt enter ’command (equivalent to the‘ docker exec ’command) via a module under its control accessing the containers.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/rkt/rkt | eq | 1.30.0 |