Runtime bugs break container walls, enabling root on Docker hosts
infoworld.com·10h
Flag this post

Three newly disclosed high-severity bugs in the “runc” container runtime let attackers break out of containers despite standard hardening and isolation controls.

According to Aleksa Sarai, a senior software engineer at SUSE and an OCI board member, the bugs stem from logic flaws in how runc handles writes to certain procfs files, letting attackers inside containers hijack host privileges by abusing masked paths, console bind-mounts, and write gadgets.

“All these vulnerabilities ultimately allow (through different methods) for full container breakouts by bypassing runc’s restrictions for writing to arbitrary /proc files,” Sarai said in an advisory posted to the oss-sec list.

Sarai emphasized that while these attacks require custom mount configurations or untrusted images, the threat…

Similar Posts

Loading similar posts...