Skip to content

Commit 1c2bcbf

Browse files
docs: Document Security Advisory 5 (#8680)
* Document Security Advisory 5 * ci: auto-formatting prettier issues * Update security-advisories.md * Update security-advisories.md * ci: auto-formatting prettier issues * Update security-advisories.md * Update docs/docs-content/security-bulletins/security-advisories/security-advisories.md Co-authored-by: Ben Radstone <[email protected]> * Update docs/docs-content/security-bulletins/security-advisories/security-advisories.md Co-authored-by: Ben Radstone <[email protected]> * ci: auto-formatting prettier issues * Update security-advisories.md * Replace internal docs CVEs links with NIST ones * Update security-advisories.md --------- Co-authored-by: svetlana-efimova <[email protected]> Co-authored-by: Ben Radstone <[email protected]>
1 parent 4ab8725 commit 1c2bcbf

File tree

1 file changed

+73
-0
lines changed

1 file changed

+73
-0
lines changed

docs/docs-content/security-bulletins/security-advisories/security-advisories.md

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,79 @@ tags: ["security", "cve", "advisories"]
1111
Security advisories supplement <VersionedLink text="security bulletins" url="/security-bulletins/reports/" />, providing
1212
additional details regarding vulnerabilities and offering remediation steps.
1313

14+
## Security Advisory 005 - `runc` Container Vulnerabilities Affecting Kubernetes Cluster Runtimes
15+
16+
- **Release Date**: November 5, 2025
17+
- **Last Update**: November 6, 2025
18+
- **Severity**: High
19+
- **Applicable Deployments**:
20+
- Workload Clusters:
21+
- cloud-managed clusters: EKS, GKE, and AKS
22+
- Kubernetes distributions: PXK, RKE2, and K3s
23+
- Palette deployments:
24+
- SaaS Palette
25+
- self-hosted Palette
26+
27+
### Related CVEs
28+
29+
- [CVE-2025-31133](https://nvd.nist.gov/vuln/detail/CVE-2025-31133)
30+
- [CVE-2025-52565](https://nvd.nist.gov/vuln/detail/CVE-2025-52565)
31+
- [CVE-2025-52881](https://nvd.nist.gov/vuln/detail/CVE-2025-52881)
32+
33+
### Timeline
34+
35+
- **November 5, 2025**: First notified of vulnerabilities.
36+
37+
### Summary
38+
39+
The recently disclosed vulnerabilities in the `runc` container runtime involve unsafe handling of `/proc` writes during
40+
container initialization and mount operations. Attackers exploiting these vulnerabilities could cause `runc` to
41+
misdirect writes within `/proc`, potentially allowing:
42+
43+
- Execution of privileged host actions (for example, triggering `/proc/sysrq-trigger` to crash or hang the host).
44+
- Read or write access to sensitive host information that would normally be masked.
45+
- Disabling of AppArmor or Security-Enhanced Linux (SELinux) confinement.
46+
- Modification of kernel parameters (for example, `core_pattern`).
47+
48+
### Recommended Actions
49+
50+
#### Workload Clusters
51+
52+
- Update cloud-managed clusters (EKS, GKE, and AKS) integrated with Palette Enterprise or Palette VerteX with patches
53+
from their respective cloud providers as soon as they become available.
54+
- Patched OS images for other clusters will be available in future releases. Upgrade to the latest Kubernetes patch
55+
versions as soon as they are available.
56+
- A patch for Edge clusters will be available in future releases. Upgrade clusters to the patched versions as soon as
57+
they are available.
58+
59+
#### SaaS Palette Deployments
60+
61+
No customer action is required. Multi-tenant and dedicated SaaS environments are being reviewed and patched as part of
62+
the standard update process. Continuous compliance scans are enabled to identify nodes with pending patches.
63+
64+
#### Self-Hosted Palette Deployments
65+
66+
- For Palette environments hosted on cloud-managed Kubernetes clusters (such as EKS), update the underlying clusters
67+
with patches provided by the respective cloud vendors.
68+
- For Palette environments deployed on customer-managed infrastructure, patched versions of Palette will be available in
69+
future releases. Upgrade your Palette environments to the patched versions as soon as they are available.
70+
- Patched Palette and VerteX appliance images downloaded from Artifact Studio will also be made available in future
71+
releases. Use the updated appliance images when deploying or upgrading Palette and VerteX instances.
72+
73+
#### Additional Recommended Workaround
74+
75+
- Avoid using untrusted or unverified container images.
76+
- Use rootless containers where possible to reduce the impact of potential runtime exploits.
77+
- Restrict container `sysctl` configurations and disable host access to `/proc/sysrq-trigger` and
78+
`/proc/sys/kernel/core_pattern` where feasible.
79+
- Reinforce Linux Security Module (LSM) enforcement and verify that AppArmor or SELinux profiles are correctly applied
80+
after applying patches.
81+
- For detailed guidance on this Advisory, refer to:
82+
- [Canonical Advisory](https://ubuntu.com/security/CVE-2025-31133)
83+
- [SUSE Advisory](https://www.suse.com/security/cve/CVE-2025-31133.html)
84+
- [Red Hat Advisory](https://access.redhat.com/security/cve/cve-2025-31133)
85+
- [GitHub Security Advisory: `runc` CVE-2025-31133, CVE-2025-52565, CVE-2025-52881](https://github.com/opencontainers/runc/security/advisories)
86+
1487
## Security Advisory 004 - MongoDB: FIPS Mode Cryptographic Algorithm Use from Non-FIPS Providers
1588

1689
- **Release Date**: September 11, 2025

0 commit comments

Comments
 (0)