Original Article Text

Click to Toggle View

Dangerous runC flaws could allow hackers to escape Docker containers. Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system. The security issues, tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 (all ), were reported this week and disclosed by SUSE software engineer and Open Container Initiative (OCI) board member Aleksa Sarai. runC is a universal container runtime and the OCI reference implementation for running containers. It is responsible for low-level operations such as creating the container process, setting up namespaces, mounts, and cgroups that higher-level tools, like Docker and Kubernetes, can call. An attacker exploiting the vulnerabilities could obtain write access to the underlying container host with root privileges: CVE-2025-31133 and CVE-2025-52881 affect all versions of runC, while CVE-2025-52565 impacts runC versions 1.0.0-rc3 and later. Fixes are available in runC versions 1.2.8, 1.3.3, 1.4.0-rc.3, and later. Exploitability and risk Researchers at cloud security company Sysdig note that exploiting the three vulnerabilities "require the ability to start containers with custom mount configurations," which an attacker can achieve through malicious container images or Dockerfiles. Currently, there have been no reports of any of the flaws being actively exploited in the wild. In an advisory this week, Sysdig shares that attempts to exploit any of the three security issues can be detected by monitoring suspicious symlink behaviors. RunC developers also shared mitigation actions, which include activating user namespaces for all containers without mapping the host root user into the container's namespace. This precaution should block the most important parts of the attack because of the Unix DAC permissions that would prevent namespaced users from accessing relevant files. Sysdig also recommends using rootless containers, if possible, to reduce the potential damage from exploiting a vulnerability. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.

Daily Brief Summary

VULNERABILITIES // Critical runC Flaws in Docker and Kubernetes Threaten Host Security

Three vulnerabilities in the runC container runtime, used by Docker and Kubernetes, could allow attackers to bypass isolation and access host systems.

The security flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were disclosed by SUSE engineer Aleksa Sarai.

Exploitation could grant attackers root-level write access to the host, affecting all runC versions, with specific vulnerabilities impacting versions 1.0.0-rc3 and later.

Fixes have been released in runC versions 1.2.8, 1.3.3, and 1.4.0-rc.3, addressing these critical security issues.

Sysdig researchers note that exploitation requires custom mount configurations, achievable through malicious container images or Dockerfiles.

No active exploitation of these vulnerabilities has been reported, but monitoring for suspicious symlink behaviors is recommended for detection.

Mitigation strategies include enabling user namespaces and using rootless containers to minimize potential damage from attacks.