- cross-posted to:
- cybersecurity@sh.itjust.works
- cross-posted to:
- cybersecurity@sh.itjust.works
The flaw allows a rogue user to escape their container and access entire file systems of the underlying host to perform code execution, and denial of service.
You must log in or register to comment.