RUNC Security Update Advisory
Overview
We have released a security update to address a vulnerability in the runc package. Users of affected products are advised to update to the latest version.
Affected Products
CVE-2025-31133, CVE-2025-52881
RUNC Versions: 1.2.7 and earlier
RUNC Versions: 1.3.2 and earlier
RUNC Versions: 1.4.0-rc.2 and earlier
CVE-2025-52565
RUNC Version: 1.0.0-rc3 or later and 1.2.7 or earlier
RUNC Version: 1.3.2 and earlier
RUNC versions: 1.4.0-RC.2 and earlier
CVE-2025-52881
SELINUX Version: 1.12.0 or earlier
Resolved Vulnerabilities
Container escape vulnerability via a masked path race condition in the runc package (CVE-2025-31133)
container escape vulnerability via /dev/console mount and related race condition in the runc package (CVE-2025-52565)
container escape and denial of service vulnerability due to arbitrary write and procfs write bypass in the runc and SELinux packages (CVE-2025-52881)
Vulnerability Patches
Vulnerability patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2025-31133, CVE-2025-52565, CVE-2025-52881
Runc version: 1.2.8
Runc version: 1.3.3
Runc version: 1.4.0-rc.3
CVE-2025-52881
Selinux version: 1.13.0
References
[1] container escape via “masked path” abuse due to mount race conditions
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[2] container escape with malicious config due to /dev/console mount and related races
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
[3] container escape and denial of service due to arbitrary write gadgets and procfs write redirects
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm