Container Escape Vulnerabilities in runc via /dev/console Mount Races
Multiple vulnerabilities were discovered in runc, the container runtime used by Docker, Kubernetes, and other platforms, that allow attackers to escape container isolation. One of the critical flaws, tracked as CVE-2025-52565, arises from insufficient validation during the bind-mounting of /dev/pts/$n to /dev/console inside containers. Attackers can exploit this race condition to redirect the mount and gain write access to protected files in the procfs, such as /proc/sysrq-trigger or /proc/sys/kernel/core_pattern, potentially leading to denial of service or container breakout. The vulnerability affects runc versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, and has been addressed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
Exploitation of CVE-2025-52565 requires the ability to start containers with custom mount configurations, making environments that run untrusted container images or Dockerfiles particularly vulnerable. No active exploits have been reported as of the disclosure, but security researchers recommend updating to the patched runc versions and monitoring for suspicious container activity. The vulnerability is similar in concept to CVE-2025-31133 but targets a different aspect of the container initialization process, specifically the timing and validation of the /dev/console mount before security protections are fully applied.
Timeline
Nov 9, 2025
Broader reporting detailed affected versions and mitigations
Subsequent reporting summarized that two of the runC flaws affected all versions and the third affected versions 1.0.0-rc3 and later, with fixes available in 1.2.8, 1.3.3, 1.4.0-rc.3, and later. Reports also highlighted mitigations such as enabling user namespaces, avoiding host-root mappings, and using rootless containers.
Nov 6, 2025
CVE-2025-52565 was cataloged in vulnerability feeds
CVE-2025-52565 was added to public vulnerability tracking feeds as a high-severity container escape issue tied to /dev/console mount handling and related race conditions in runC. This reflected broader public indexing of the disclosed flaw.
Nov 6, 2025
Vendor and security coverage warned of runC container-escape risk
Security vendors and media, including Sysdig and Fortinet, published analyses highlighting the newly disclosed runC flaws and their impact on Docker and Kubernetes environments. Coverage emphasized that exploitation could let attackers break container isolation, while noting no active exploitation had been reported.
Nov 5, 2025
GitHub advisories disclosed three runC vulnerabilities
GitHub security advisories were published for CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, describing container escape and denial-of-service risks in runC. The advisories identified issues including masked-path abuse, /dev/console mount races, and procfs write redirects.
Nov 5, 2025
runC fixed three container-escape flaws in new releases
The opencontainers/runc project published patched releases v1.2.8, v1.3.3, and v1.4.0-rc.3 to address three vulnerabilities: CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881. The flaws could enable container escape through mount and symlink race conditions and related arbitrary-write paths.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Vulnerabilities
Affected Products
Sources
5 more from sources like github advisories github link and github.com
Related Stories

Critical runC Vulnerabilities Enable Full Container Escape and Host Compromise
Security researchers have disclosed three critical vulnerabilities in the runC container runtime, which is widely used in platforms such as Docker and Kubernetes. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, arise from logic and race-condition errors in runC's handling of temporary bind mounts, symbolic links, and certain write operations. Attackers can exploit these weaknesses to break container isolation, potentially gaining write access to sensitive host system files and kernel interfaces such as `/proc/sys/kernel/core_pattern` or `/proc/sysrq-trigger`, leading to full container escapes and even host-level compromise. The vulnerabilities allow attackers to abuse masked paths, console bind-mounts, and redirected writes, bypassing standard hardening and isolation controls. Exploitation requires either custom mount configurations or the use of untrusted container images, but the risk is significant for orchestrated environments like Docker and Kubernetes. Security advisories from both the runC project and the U.S. National Vulnerability Database urge immediate updates to patched versions or the application of provided patches to mitigate these threats. The vulnerabilities highlight the importance of robust container runtime security and the potential impact of logic flaws in core infrastructure components.
1 months ago
Critical OpenShift and OpenSSH Flaws Expose Linux Systems to Root Access
Authorities warned that **Red Hat OpenShift Container Platform 4** contains two high-severity vulnerabilities that can lead to code execution and node takeover in enterprise container environments. `CVE-2024-45496` in `ose-openshift-controller-manager-container` carries a **CVSS 9.9** rating and can allow arbitrary code execution on an OpenShift node when a user with developer-level access exploits insufficient restrictions on elevated privileges. `CVE-2024-7387` in `openshift4/ose-docker-builder`, rated **CVSS 9.1**, can enable arbitrary command execution on an OpenShift node and may allow privilege escalation and full control of the affected node. At the time of the alert, mitigations were available but vendor patches had not yet been released. A separate alert highlighted the **regreSSHion** flaw in **OpenSSH**, which can give an attacker unrestricted root-level access on vulnerable Linux and FreeBSD-based systems. The issue affects OpenSSH versions from `8.5p1` up to but not including `9.8p1`, as well as versions earlier than `4.4p1`; OpenBSD-based systems were reported as not vulnerable. Successful exploitation has been confirmed on systems using **glibc**, while systems using **musl libc** were reported as not vulnerable, and the attack currently requires repeated attempts over hours or days. A fix is available in **OpenSSH `9.8p1`**, though some distributors have backported the patch, meaning package version numbers alone may not reliably indicate exposure.
1 weeks ago
Path Traversal Vulnerability in Docker Compose via OCI Artifact Layer Annotations
A high-severity path traversal vulnerability, tracked as CVE-2025-62725, was discovered in Docker Compose's handling of OCI-based Compose artifacts. The flaw allowed attackers to exploit the way Docker Compose processed layer annotations such as `com.docker.compose.file` and `com.docker.compose.envfile`, enabling them to escape the intended cache directory and write arbitrary files to the host system. This vulnerability could be triggered by tricking a user into referencing a malicious remote artifact, and affected a wide range of environments including Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, and cloud development environments. The vulnerability was rated High with a CVSS score of 8.9 and could be exploited even through read-only commands like `docker compose config` or `docker compose ps`. The issue was patched in Docker Compose version v2.40.2, and users are strongly advised to upgrade to this version or later to mitigate the risk. The vulnerability was responsibly disclosed and detailed technical analysis, including proof of concept and exploitation scenarios, has been published to aid defenders in understanding and addressing the issue.
1 months ago