{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "1.30.0"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "e04dd994baa1051f1205578d12d69eec83dbb905"
            }
          ],
          "repo": "https://github.com/rkt/rkt",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.",
  "id": "CVE-2019-10144",
  "modified": "2026-03-13T21:52:39.762843649Z",
  "published": "2019-06-03T19:29:01.750Z",
  "references": [
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10144"
    },
    {
      "type": "EVIDENCE",
      "url": "https://www.twistlock.com/labs-blog/breaking-out-of-coresos-rkt-3-new-cves/"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}