CVE-2025-52881

HIGH

runc <1.4.0-rc.2 - Privilege Escalation

Title source: llm

Description

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.

Exploits (1)

nomisec WRITEUP 15 stars
by jq6l43d1 · poc
https://github.com/jq6l43d1/proxmox-lxc-docker-fix

References (20)

Scores

CVSS v3 7.5
EPSS 0.0004
EPSS Percentile 13.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

Classification

CWE
CWE-61 CWE-363
Status published

Affected Products (5)

linuxfoundation/runc < 1.2.8
linuxfoundation/runc
linuxfoundation/runc
opencontainers/runc < 1.2.8Go
opencontainers/selinux < 1.13.0Go

Timeline

Published Nov 06, 2025
Tracked Since Feb 18, 2026