icon

We found results for “

CVE-2025-52565

Good to know:

icon
icon

Date: November 5, 2025

Impact This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of /dev/pts/$n to /dev/console as configured for all containers that allocate a console). In runc version 1.0.0-rc3 and later, due to insufficient checks when bind-mounting /dev/pts/$n to /dev/console inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This happens after pivot_root(2), so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of /proc/sysrq-trigger or /proc/sys/kernel/core_pattern (respectively). The reason that the attacker can gain write access to these files is because the /dev/console bind-mount happens before maskedPaths and readonlyPaths are applied. This attack was analysed as having a CVSSv4 severity of 7.3 (High) using the vector CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H. Additional Findings While investigating this issue, we discovered some other theoretical issues that may or may not be exploitable, as well as taking the opportunity to fix some fairly well-known issues related to consoles.

Severity Score

Severity Score

Weakness Type (CWE)

Race Condition Enabling Link Following

CWE-363

UNIX Symbolic Link (Symlink) Following

CWE-61

Top Fix

icon

Upgrade Version

Upgrade to version github.com/opencontainers/runc - v1.2.8;github.com/opencontainers/runc - v1.3.3;github.com/opencontainers/runc - v1.4.0-rc.3;github.com/opencontainers/runc - v1.2.8;github.com/opencontainers/runc - v1.3.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us