@@ -11,6 +11,79 @@ tags: ["security", "cve", "advisories"]
1111Security advisories supplement <VersionedLink text =" security bulletins " url =" /security-bulletins/reports/ " />, providing
1212additional details regarding vulnerabilities and offering remediation steps.
1313
14+ ## Security Advisory 005 - ` runc ` Container Vulnerabilities Affecting Kubernetes Cluster Runtimes
15+
16+ - ** Release Date** : November 5, 2025
17+ - ** Last Update** : November 6, 2025
18+ - ** Severity** : High
19+ - ** Applicable Deployments** :
20+ - Workload Clusters:
21+ - cloud-managed clusters: EKS, GKE, and AKS
22+ - Kubernetes distributions: PXK, RKE2, and K3s
23+ - Palette deployments:
24+ - SaaS Palette
25+ - self-hosted Palette
26+
27+ ### Related CVEs
28+
29+ - [ CVE-2025 -31133] ( https://nvd.nist.gov/vuln/detail/CVE-2025-31133 )
30+ - [ CVE-2025 -52565] ( https://nvd.nist.gov/vuln/detail/CVE-2025-52565 )
31+ - [ CVE-2025 -52881] ( https://nvd.nist.gov/vuln/detail/CVE-2025-52881 )
32+
33+ ### Timeline
34+
35+ - ** November 5, 2025** : First notified of vulnerabilities.
36+
37+ ### Summary
38+
39+ The recently disclosed vulnerabilities in the ` runc ` container runtime involve unsafe handling of ` /proc ` writes during
40+ container initialization and mount operations. Attackers exploiting these vulnerabilities could cause ` runc ` to
41+ misdirect writes within ` /proc ` , potentially allowing:
42+
43+ - Execution of privileged host actions (for example, triggering ` /proc/sysrq-trigger ` to crash or hang the host).
44+ - Read or write access to sensitive host information that would normally be masked.
45+ - Disabling of AppArmor or Security-Enhanced Linux (SELinux) confinement.
46+ - Modification of kernel parameters (for example, ` core_pattern ` ).
47+
48+ ### Recommended Actions
49+
50+ #### Workload Clusters
51+
52+ - Update cloud-managed clusters (EKS, GKE, and AKS) integrated with Palette Enterprise or Palette VerteX with patches
53+ from their respective cloud providers as soon as they become available.
54+ - Patched OS images for other clusters will be available in future releases. Upgrade to the latest Kubernetes patch
55+ versions as soon as they are available.
56+ - A patch for Edge clusters will be available in future releases. Upgrade clusters to the patched versions as soon as
57+ they are available.
58+
59+ #### SaaS Palette Deployments
60+
61+ No customer action is required. Multi-tenant and dedicated SaaS environments are being reviewed and patched as part of
62+ the standard update process. Continuous compliance scans are enabled to identify nodes with pending patches.
63+
64+ #### Self-Hosted Palette Deployments
65+
66+ - For Palette environments hosted on cloud-managed Kubernetes clusters (such as EKS), update the underlying clusters
67+ with patches provided by the respective cloud vendors.
68+ - For Palette environments deployed on customer-managed infrastructure, patched versions of Palette will be available in
69+ future releases. Upgrade your Palette environments to the patched versions as soon as they are available.
70+ - Patched Palette and VerteX appliance images downloaded from Artifact Studio will also be made available in future
71+ releases. Use the updated appliance images when deploying or upgrading Palette and VerteX instances.
72+
73+ #### Additional Recommended Workaround
74+
75+ - Avoid using untrusted or unverified container images.
76+ - Use rootless containers where possible to reduce the impact of potential runtime exploits.
77+ - Restrict container ` sysctl ` configurations and disable host access to ` /proc/sysrq-trigger ` and
78+ ` /proc/sys/kernel/core_pattern ` where feasible.
79+ - Reinforce Linux Security Module (LSM) enforcement and verify that AppArmor or SELinux profiles are correctly applied
80+ after applying patches.
81+ - For detailed guidance on this Advisory, refer to:
82+ - [ Canonical Advisory] ( https://ubuntu.com/security/CVE-2025-31133 )
83+ - [ SUSE Advisory] ( https://www.suse.com/security/cve/CVE-2025-31133.html )
84+ - [ Red Hat Advisory] ( https://access.redhat.com/security/cve/cve-2025-31133 )
85+ - [ GitHub Security Advisory: ` runc ` CVE-2025 -31133, CVE-2025 -52565, CVE-2025 -52881] ( https://github.com/opencontainers/runc/security/advisories )
86+
1487## Security Advisory 004 - MongoDB: FIPS Mode Cryptographic Algorithm Use from Non-FIPS Providers
1588
1689- ** Release Date** : September 11, 2025
0 commit comments