CVE-2025-52881

 

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
https://nvd.nist.gov/vuln/detail/CVE-2025-52881

Categories

CWE-61 : UNIX Symbolic Link (Symlink) Following
A product that allows UNIX symbolic links (symlink) as part of paths whether in internal code or through user input can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read/write/corrupt a file that they originally did not have permissions to access.

References

security-advisories@github.com

http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e28014...
http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aa...
https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc...
https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae54...
https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb17...
https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549...
https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33...
https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9a...
https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e8156...
https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16...
https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811e...
https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325...
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f9...
https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888...
https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61...
https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b7...
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
27 Leveraging Race Conditions via Symbolic Links
High