Container breakouts are real. CVE-2025-9074 from August 2025 let containers access Docker's API without auth - basically any container could own your entire Docker setup.
ECI uses Linux user namespaces to run every container as an unprivileged user. Even if you run docker run --privileged
, the container thinks it's root but it's actually just user ID 100000+ on the host.
How This Actually Works
Docker swaps out the regular runc runtime for Sysbox when you enable ECI. Docker bought Nestybox in 2022 for their user namespace tech.
Your containers still work exactly the same - same commands, same Dockerfiles, same everything. The isolation happens under the hood.
Why You Might Want This
- Containers can't break out and mess with your host system
--privileged
containers become actually safe to run- Security teams stop breathing down your neck about Docker
- No workflow changes required
Why You Might Not Care
- Only works on Docker Desktop (macOS/Windows)
- Adds complexity you'll curse when debugging
- Performance impact is minimal but exists
- If you're already running rootless Docker on Linux, this doesn't help you
- Docker Desktop Business costs $21/month per dev (as of September 2025) - beancounters will want to know
The CVE-2025-9074 Reality Check
Here's the fucked up part - ECI couldn't stop CVE-2025-9074. I was running Docker Desktop 4.44.2 when this dropped and any container could hit Docker's API at 192.168.65.7:2375
even with ECI turned on. Took them until August 20, 2025 to patch it in version 4.44.3.
Any container could spawn new containers, mount your fucking hard drive, the works. On Windows with WSL it was game over - complete host takeover. The exploit code is public so every script kiddie can use it. ECI stops the usual privilege escalation bullshit but can't fix network-level API fuckups.
Still useful for layered security, but don't think it's a magic security bullet.
Additional Reading
- Docker Security Best Practices - OWASP's comprehensive Docker security guide
- Container Security Guide by NIST - NIST's official container security recommendations
- Kubernetes User Namespaces - How K8s is adopting user namespaces by default
- Container Escape Techniques Analysis - Palo Alto's breakdown of container escape methods
- Linux Namespaces Deep Dive - Technical deep dive into how namespaces work