Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-31133— runc container escape via "masked path" abuse due to mount race conditions

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-31133

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
runc container escape via "masked path" abuse due to mount race conditions
Source: NVD (National Vulnerability Database)
Vulnerability Description
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-61
Source: NVD (National Vulnerability Database)
Vulnerability Title
runc 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
runc是Open Container Initiative开源的一款用于根据OCI规范生成和运行容器的CLI(命令行界面)工具。 runc 1.2.7及之前版本、1.3.0-rc.1版本至1.3.1版本、1.4.0-rc.1版本和1.4.0-rc.2版本存在安全漏洞,该漏洞源于未充分验证绑定挂载源的真实性,可能导致主机信息泄露、主机拒绝服务、容器逃逸或绕过maskedPaths。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
opencontainersrunc < 1.2.8 -

II. Public POCs for CVE-2025-31133

#POC DescriptionSource LinkShenlong Link
1DEPRECATED See CVE-2025-31133, CVE-2025-52565, CVE-2025-52881https://github.com/omne-earth/arcaPOC Details
2Nonehttps://github.com/sahar042/CVE-2025-31133POC Details
3CVE-2025-31133 PoChttps://github.com/skynet-f-nvidia/CVE-2025-31133POC Details
4Learn about CVE-2025-31133https://github.com/C-h4ck-0/Learn-about-cve-2025-31133-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-31133

登录查看更多情报信息。

Same Patch Batch · opencontainers · 2025-11-06 · 3 CVEs total

CVE-2025-52565container escape due to /dev/console mount and related races
CVE-2025-52881runc: LSM labels can be bypassed with malicious config using dummy procfs files

IV. Related Vulnerabilities

V. Comments for CVE-2025-31133

No comments yet


Leave a comment