RUNC Security Update Advisory

RUNC Security Update Advisory

Overview

 

We have released a security update to address a vulnerability in the runc package. Users of affected products are advised to update to the latest version.
 

 

Affected Products

 

CVE-2025-31133, CVE-2025-52881

 

RUNC Versions: 1.2.7 and earlier
RUNC Versions: 1.3.2 and earlier
RUNC Versions: 1.4.0-rc.2 and earlier

 

CVE-2025-52565

 

RUNC Version: 1.0.0-rc3 or later and 1.2.7 or earlier
RUNC Version: 1.3.2 and earlier
RUNC versions: 1.4.0-RC.2 and earlier

 

CVE-2025-52881

 

SELINUX Version: 1.12.0 or earlier

 

 

Resolved Vulnerabilities

 

Container escape vulnerability via a masked path race condition in the runc package (CVE-2025-31133)
container escape vulnerability via /dev/console mount and related race condition in the runc package (CVE-2025-52565)
container escape and denial of service vulnerability due to arbitrary write and procfs write bypass in the runc and SELinux packages (CVE-2025-52881)

 

 

Vulnerability Patches

Vulnerability patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2025-31133, CVE-2025-52565, CVE-2025-52881

 

Runc version: 1.2.8
Runc version: 1.3.3
Runc version: 1.4.0-rc.3

 

CVE-2025-52881

 

Selinux version: 1.13.0

 

 

References

 

[1] container escape via “masked path” abuse due to mount race conditions
https://github.com/opencontainers/runc/security/advisories/GHSA-9493-h29p-rfm2
[2] container escape with malicious config due to /dev/console mount and related races
https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r
[3] container escape and denial of service due to arbitrary write gadgets and procfs write redirects
https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm