> . Kernel bugs which allow escaping a properly setup mount namespace or peeking out of a pid namespace or going from root in a userns to root on the host are all treated as vulnerabilities and patched. That clearly expresses the intent.
This is because these vulns can be exploited locally without containers.
This is because these vulns can be exploited locally without containers.