7.5 CVE-2025-52881

Enriched by CISA Patch Exploit
 

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
https://nvd.nist.gov/vuln/detail/CVE-2025-52881

Categories

CWE-61 : UNIX Symbolic Link (Symlink) Following
A product that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.

References

security-advisories@github.com Patch Exploit

http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e28014...
Patch
http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aa...
Patch
https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
Patch
https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc...
Patch
https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae54...
Patch
https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb17...
Patch
https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549...
Patch
https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33...
Patch
https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9a...
Patch
https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e8156...
Patch
https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16...
Patch
https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811e...
Patch
https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325...
Patch
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f9...
Patch
https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888...
Patch
https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61...
Patch
https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b7...
Patch
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
Patch Third Party Advisory
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
Exploit Mitigation Patch Third Party Advisory
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
Patch Third Party Advisory


 

AFFECTED (from MITRE)


Vendor Product Versions
opencontainers runc
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* < 1.2.8
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:* >= 1.3.0 < 1.3.3
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc2:*:*:*:*:*:*


REMEDIATION


Patch

Url
http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e28014...
http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aa...
https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc...
https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae54...
https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb17...
https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549...
https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33...
https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9a...
https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e8156...
https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16...
https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811e...
https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325...
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f9...
https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888...
https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61...
https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b7...
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
27 Leveraging Race Conditions via Symbolic Links
High