Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-52881

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-06 Nov, 2025 | 20:23
Updated At-06 Nov, 2025 | 21:07
Rejected At-
Credits

runc: LSM labels can be bypassed with malicious config using dummy procfs files

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:06 Nov, 2025 | 20:23
Updated At:06 Nov, 2025 | 21:07
Rejected At:
▼CVE Numbering Authority (CNA)
runc: LSM labels can be bypassed with malicious config using dummy procfs files

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

Affected Products
Vendor
opencontainers
Product
runc
Versions
Affected
  • <= 1.2.7, < 1.2.8
  • <= 1.3.2, < 1.3.3
  • <= 1.4.0-rc.2, < 1.4.0-rc.3
Problem Types
TypeCWE IDDescription
CWECWE-61CWE-61: UNIX Symbolic Link (Symlink) Following
CWECWE-363CWE-363: Race Condition Enabling Link Following
Type: CWE
CWE ID: CWE-61
Description: CWE-61: UNIX Symbolic Link (Symlink) Following
Type: CWE
CWE ID: CWE-363
Description: CWE-363: Race Condition Enabling Link Following
Metrics
VersionBase scoreBase severityVector
4.07.3HIGH
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
x_refsource_CONFIRM
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
x_refsource_MISC
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
x_refsource_MISC
https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
x_refsource_MISC
https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
x_refsource_MISC
https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
x_refsource_MISC
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
x_refsource_MISC
https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
x_refsource_MISC
https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
x_refsource_MISC
https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
x_refsource_MISC
https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
x_refsource_MISC
https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
x_refsource_MISC
https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
x_refsource_MISC
https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
x_refsource_MISC
https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
x_refsource_MISC
https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
x_refsource_MISC
https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
x_refsource_MISC
https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
x_refsource_MISC
http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
x_refsource_MISC
http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
Resource:
x_refsource_MISC
Hyperlink: https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
Resource:
x_refsource_MISC
Hyperlink: http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
Resource:
x_refsource_MISC
Hyperlink: http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:06 Nov, 2025 | 21:15
Updated At:03 Dec, 2025 | 18:37

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.3HIGH
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.5HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
CPE Matches

The Linux Foundation
linuxfoundation
>>runc>>Versions before 1.2.8(exclusive)
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>runc>>Versions from 1.3.0(inclusive) to 1.3.3(exclusive)
cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>runc>>1.4.0
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc1:*:*:*:*:*:*
The Linux Foundation
linuxfoundation
>>runc>>1.4.0
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-61Primarysecurity-advisories@github.com
CWE-363Primarysecurity-advisories@github.com
CWE ID: CWE-61
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-363
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322security-advisories@github.com
Patch
http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3security-advisories@github.com
Patch
https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.mdsecurity-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6dsecurity-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651fsecurity-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572dbsecurity-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51security-advisories@github.com
Patch
https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480security-advisories@github.com
Patch
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2security-advisories@github.com
Third Party Advisory
Patch
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prmsecurity-advisories@github.com
Third Party Advisory
Exploit
Mitigation
Patch
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7rsecurity-advisories@github.com
Third Party Advisory
Patch
Hyperlink: http://github.com/opencontainers/runc/commit/a41366e74080fa9f26a2cd3544e2801449697322
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: http://github.com/opencontainers/runc/commit/fdcc9d3cad2f85954a241ccb910a61aaa1ef47f3
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/blob/v1.4.0-rc.2/RELEASES.md
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/3f925525b44d247e390e529e772a0dc0c0bc3557
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/435cc81be6b79cdec73b4002c0dae549b2f6ae6d
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/44a0fcf685db051c80b8c269812bb177f5802c58
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/4b37cd93f86e72feac866442988b549b5b7bf3e6
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/6fc191449109ea14bb7d61238f24a33fe08c651f
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/77889b56db939c323d29d1130f28f9aea2edb544
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/77d217c7c3775d8ca5af89e477e81568ef4572db
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/b3dd1bc562ed9996d1a0f249e056c16624046d28
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/d40b3439a9614a86e87b81a94c6811ec6fa2d7d2
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/d61fd29d854b416feaaf128bf650325cd2182165
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/ed6b1693b8b3ae7eb0250a7e76fc888cdacf98c1
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/ff6fe1324663538167eca8b3d3eec61e1bd4fa51
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
Source: security-advisories@github.com
Resource:
Third Party Advisory
Patch
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm
Source: security-advisories@github.com
Resource:
Third Party Advisory
Exploit
Mitigation
Patch
Hyperlink: https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
Source: security-advisories@github.com
Resource:
Third Party Advisory
Patch

Change History

0
Information is not available yet

Similar CVEs

5Records found

CVE-2025-52565
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-8.4||HIGH
EPSS-0.02% / 4.47%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 20:02
Updated-03 Dec, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
container escape due to /dev/console mount and related races

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

Action-Not Available
Vendor-opencontainersThe Linux Foundation
Product-runcrunc
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-31133
Matching Score-10
Assigner-GitHub, Inc.
ShareView Details
Matching Score-10
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.02% / 4.54%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 18:47
Updated-03 Dec, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
runc container escape via "masked path" abuse due to mount race conditions

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

Action-Not Available
Vendor-opencontainersThe Linux Foundation
Product-runcrunc
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2024-45310
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-3.6||LOW
EPSS-0.15% / 35.47%
||
7 Day CHG~0.00%
Published-03 Sep, 2024 | 19:07
Updated-25 Nov, 2025 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
runc can be confused to create empty files/directories on the host

runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3. Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.

Action-Not Available
Vendor-opencontainersThe Linux Foundation
Product-runcrunc
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-62161
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.37%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:09
Updated-10 Nov, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youki container escape via "masked path" abuse due to mount race conditions

Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.

Action-Not Available
Vendor-youki-devyouki-dev
Product-youkiyouki
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-62596
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.28%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:14
Updated-10 Nov, 2025 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

Action-Not Available
Vendor-youki-devyouki-dev
Product-youkiyouki
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
Details not found