Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-52881
November 06, 2025
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
Affected Packages
https://github.com/opencontainers/runc.git (GITHUB):
Affected version(s) >=v1.3.0-rc.1 <v1.3.3
Fix Suggestion:
Update to version v1.3.3
https://github.com/opencontainers/runc.git (GITHUB):
Affected version(s) >=v1.4.0-rc.1 <v1.4.0-rc.3
Fix Suggestion:
Update to version v1.4.0-rc.3
https://github.com/opencontainers/runc.git (GITHUB):
Affected version(s) >=v0.0.1 <v1.2.8
Fix Suggestion:
Update to version v1.2.8
github.com/opencontainers/runc (GO):
Affected version(s) >=v1.3.0 <v1.3.3
Fix Suggestion:
Update to version v1.3.3
github.com/opencontainers/runc (GO):
Affected version(s) >=v0.1.0 <v1.2.8
Fix Suggestion:
Update to version v1.2.8
github.com/opencontainers/runc (GO):
Affected version(s) >=v1.4.0-rc.1 <1.4.0-rc.3
Fix Suggestion:
Update to version 1.4.0-rc.3
github.com/opencontainers/selinux (GO):
Affected version(s) >=bb3d708beeb63c09db86c395f714a023c983a019 <v1.13.0
Fix Suggestion:
Update to version v1.13.0
Related ResourcesĀ (30)
Do you need more information?
Contact Us
CVSS v4
Base Score:
7.3
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
LOW
User Interaction
ACTIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8.2
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Race Condition Enabling Link Following
UNIX Symbolic Link (Symlink) Following
EPSS
Base Score:
0.03