CVE-2025-52881
November 06, 2025
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
Affected Packages
https://github.com/opencontainers/runc.git (GITHUB):
Affected version(s) >=v1.3.0-rc.1 <v1.3.3Fix Suggestion:
Update to version v1.3.3https://github.com/opencontainers/runc.git (GITHUB):
Affected version(s) >=v1.4.0-rc.1 <v1.4.0-rc.3Fix Suggestion:
Update to version v1.4.0-rc.3https://github.com/opencontainers/runc.git (GITHUB):
Affected version(s) >=v0.0.1 <v1.2.8Fix Suggestion:
Update to version v1.2.8github.com/opencontainers/runc (GO):
Affected version(s) >=v1.3.0 <v1.3.3Fix Suggestion:
Update to version v1.3.3github.com/opencontainers/runc (GO):
Affected version(s) >=v0.1.0 <v1.2.8Fix Suggestion:
Update to version v1.2.8github.com/opencontainers/runc (GO):
Affected version(s) >=v1.4.0-rc.1 <1.4.0-rc.3Fix Suggestion:
Update to version 1.4.0-rc.3github.com/opencontainers/selinux (GO):
Affected version(s) >=bb3d708beeb63c09db86c395f714a023c983a019 <v1.13.0Fix Suggestion:
Update to version v1.13.0Related ResourcesĀ (30)
Do you need more information?
Contact UsCVSS v4
Base Score:
7.3
Attack Vector
LOCAL
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
LOW
User Interaction
ACTIVE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
8.2
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
EPSS
Base Score:
0.03