Description
runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
Published: 2025-11-06
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qw9x-cqr3-wc7r runc container escape with malicious config due to /dev/console mount and related races
History

Wed, 03 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation runc
CPEs cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc90:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc91:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc92:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc93:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc94:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc95:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:runc:1.4.0:rc2:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation runc
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Opencontainers
Opencontainers runc
Vendors & Products Opencontainers
Opencontainers runc

Thu, 06 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in runc. CVE-2025-52565 is very similar in concept and application toCVE-2025-31133, except that it exploits a flaw in /dev/console bind-mounts. When creating the /dev/console bind-mount (to /dev/pts/$n), if an attacker replaces /dev/pts/$n with a symlink then runc will bind-mount the symlink target over /dev/console. runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
Title runc: container escape with malicious config due to /dev/console mount and related races container escape due to /dev/console mount and related races
Weaknesses CWE-363
CWE-61
References
Metrics cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H'}


Thu, 06 Nov 2025 12:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in runc. CVE-2025-52565 is very similar in concept and application toCVE-2025-31133, except that it exploits a flaw in /dev/console bind-mounts. When creating the /dev/console bind-mount (to /dev/pts/$n), if an attacker replaces /dev/pts/$n with a symlink then runc will bind-mount the symlink target over /dev/console.
Title runc: container escape with malicious config due to /dev/console mount and related races
Weaknesses CWE-59
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}

threat_severity

Important


Subscriptions

Linuxfoundation Runc
Opencontainers Runc
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-06T21:32:19.129Z

Reserved: 2025-06-18T03:55:52.036Z

Link: CVE-2025-52565

cve-icon Vulnrichment

Updated: 2025-11-06T21:32:12.507Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-06T20:15:49.240

Modified: 2025-12-03T18:33:33.357

Link: CVE-2025-52565

cve-icon Redhat

Severity : Important

Publid Date: 2025-11-05T00:00:00Z

Links: CVE-2025-52565 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-11-07T10:53:54Z

Weaknesses