Three dangerous runC Flaws could allow Threat Actors to escape Docker Containers.

Researchers at cloud security company Sysdig note that exploiting the three vulnerabilities "require the ability to start containers with custom mount configurations," which an attacker can achieve through malicious container images or Dockerfiles.

http://www.sysdig.com/blog/runc-container-escape-vulnerabilities

#runC #it #security #privacy #engineer #media #secure #programming #tech #developer #news

#POSIX mandates creating files through dangling symbolic links which opens the door for attack vectors which are still relevant today as we see from the #runc breaks where the attacker can plant a dangling symlink at /dev/{null,console} to create trouble. As of 3.45.0, #sydbox implies O_NOFOLLOW at open(2) boundary for O_CREAT unless O_EXCL was also passed. The mitigation can be disabled with the option "trace/allow_unsafe_create:1". See 2nd paragraph: https://man.exherbo.org/syd.7.html#Trusted_File_Creation #linux #security
SYD(7)

コンテナ実行にかかわる #runc にて3つの脆弱性(大きめ)が報告されています。
使用されている方々は要チェックです!
#Linux #コンテナ技術 #セキュリティ #security #news

https://www.itmedia.co.jp/enterprise/articles/2511/12/news040.html

runcに3件の深刻な脆弱性 全バージョンが影響を受けるため今すぐ更新を:セキュリティニュースアラート

runcに競合状態を突く3件の脆弱性が発見された。/procへの任意書き込みやホストroot奪取に至る可能性が高い。runcの更新およびユーザー名前空間有効化などが推奨されている。

ITmedia エンタープライズ
🚨 All channels include critical fixes for runc vulnerabilities -
CVE-2025-31133, CVE-2025-52565, CVE-2025-52881. Update soon to stay safe!
#Flatcar #Security #runc

Alert: Three critical runC vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) enable mount/symlink-based escapes that may redirect writes to /proc or other host targets. A successful exploit requires container start privileges via crafted mounts or malicious images/Dockerfiles. Patches: runC 1.2.8 / 1.3.3 / 1.4.0-rc.3+.
Detection & mitigation guidance:
• Patch runC immediately.
• Deploy rootless containers and enable user namespaces without host root mapping.
• Monitor for rapid symlink creation, unexpected bind mounts of /dev/null or /dev/console, and anomalous writes to procfs entries (e.g., /proc/sysrq-trigger).
• Harden CI/CD image provenance checks and disallow unverified custom mount configurations.
Share any YARA/OSQuery/Suricata rules you’ve validated — let’s collate detection patterns. Follow TechNadu for vetted technical advisories.

#containersecurity #runC #CVE #Kubernetes #Docker #threathunting #DFIR #DevSecOps

📰 Critical Container Escape Flaws in runC Threaten Docker & Kubernetes

🚨 CRITICAL VULNERABILITY: Three new flaws in runC, the core runtime for Docker & Kubernetes, allow for container escape. Attackers could gain host access. This is a major threat to cloud environments. Patch immediately! #runC #Docker #Kubernetes

🔗 https://cyber.netsecops.io/articles/critical-flaws-in-runc-container-runtime-threaten-docker-kubernetes/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

Critical Container Escape Flaws in runC Threaten Docker & Kubernetes

Three critical new vulnerabilities have been found in runC, the core container runtime for Docker and Kubernetes, which could allow attackers to escape container isolation and access the host OS.

CyberNetSec.io

It's been a bit light on news over the last 24 hours, but we've got a couple of important updates: a widespread phishing scam targeting lost iPhone users and critical container escape vulnerabilities in runC. Let's dive in:

Lost iPhone Phishing Scam ⚠️

- The Swiss National Cyber Security Centre (NCSC) is warning iPhone users about a sophisticated phishing scam.
- Scammers are using information from a lost device's lock screen message (model, colour, contact details) to send convincing SMS or iMessage texts, claiming the phone has been found.
- The goal is to trick victims into entering their Apple ID credentials on a fake "Find My" website, allowing attackers to disable Activation Lock and potentially resell the device. Always ignore unsolicited messages and never click links; Apple will not contact you via SMS or email about a found device.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/lost-iphone-dont-fall-for-phishing-texts-saying-it-was-found/

Dangerous runC Container Escape Flaws 🛡️

- Three new vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) have been disclosed in runC, the container runtime used by Docker and Kubernetes.
- These flaws could allow an attacker to bypass container isolation and gain root-level write access to the underlying host system, primarily by exploiting issues with bind-mounts and /proc redirection.
- While exploitation requires the ability to start containers with custom mount configurations, organisations should update to runC versions 1.2.8, 1.3.3, 1.4.0-rc.3 or later, activate user namespaces, and consider using rootless containers as mitigation.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/

#CyberSecurity #ThreatIntelligence #Phishing #SocialEngineering #AppleID #Vulnerability #runC #ContainerSecurity #Docker #Kubernetes #InfoSec #CyberAttack #IncidentResponse

Lost iPhone? Don’t fall for phishing texts saying it was found

The Swiss National Cyber Security Centre (NCSC) is warning iPhone owners about a phishing scam that claims to have found your lost or stolen iPhone but is actually trying to steal your Apple ID credentials.

BleepingComputer

#Kubernetes: Newly disclosed #vulnerabilities in the #runC container runtime used in #Docker & Kubernetes (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) could be exploited to bypass isolation restrictions & get access to the host system (escape):
#k8s

https://www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/

Dangerous runC flaws could allow hackers to escape Docker containers

Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system.

BleepingComputer
Systemd cgroup driver: CPU quota calculation mismatch between containerd and runc causes container creation failure · Issue #4982 · opencontainers/runc

Description When using the systemd cgroup driver with a CPU limit of 4096m, pod creation fails intermittently because containerd non-deterministically calculates either 409600 or 410000 microsecond...

GitHub
更新されたよ、見に来てね!→ 【ダイジェスト】#Linux 激震! #セキュリティ ・ デスクトップ ・ アプリの 未来が変わる日 11月6日(木) #OSS #security #runc #wayland #X11 #news https://www.youtube.com/shorts/TS2_w2tq6C4
【ダイジェスト】#Linux 激震! #セキュリティ ・ デスクトップ ・ アプリの 未来が変わる日 11月6日(木) #OSS #security #runc #wayland #X11 #news

YouTube