Three vulnerabilities in the runC container runtime used by Docker and Kubernetes could allow attackers to bypass isolation and gain control of the host system. Fixes are available, but exploitation could lead to container escape and root access if specific conditions are met. #runC #ContainerEscape
Keypoints