Key Takeaways
Three critical vulnerabilities in runC, the low-level Open Container Initiative (OCI) runtime, have been disclosed, creating significant container security risks for environments using Docker and Kubernetes. The flaws could be exploited to achieve a Docker container escape, granting an attacker write access and root privileges on the host operating system.
AWS acknowledged these flaws are “affecting the runC component of several open source container management systems” when launching new containers:
The vulnerabilities exploit race conditions and symbolic link (symlink) manipulations during the container initialization process, tricking runC into mounting attacker-controlled targets or performing arbitrary writes to sensitive host files.
An attacker with the ability to start a container using custom mount configurations—achievable through a malicious container image or Dockerfile—could exploit these runC vulnerabilities. Yet, there are no reports of active exploitation.
The maintainers of runC have released patches to address all three vulnerabilities. System administrators are strongly urged to update to runC versions 1.2.8, 1.3.3, 1.4.0-rc.3, or newer to remediate the flaws.
On November 12, 2025, an updated Amazon ECS and EKS Optimized AMI will be available as the default Compute Environment AMI.
Among security measures are:
“AWS does not consider containers a security boundary, and does not utilize containers to isolate customers from each other,” the AWS advisory said. “There is no cross-customer risk from these issues.”
AWS encourages customers who use containers to isolate workloads within self-managed environments to consult their operating system vendor for any updates or instructions.
Ratan Tipirneni, President and CEO at Tigera, describes how Kubernetes adoption as the orchestrator of generative AI applications brings both opportunity and risk in an interview with TechNadu.