{"id":"CVE-2025-52565","summary":"container escape due to /dev/console mount and related races","details":"runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.","aliases":["GHSA-qw9x-cqr3-wc7r","GO-2025-4097"],"modified":"2026-05-17T03:54:39.438128996Z","published":"2025-11-06T20:02:58.513Z","related":["ALSA-2025:19927","ALSA-2025:20957","ALSA-2025:21232","CGA-7fr5-r9wv-f462","SUSE-SU-2025:21036-1","SUSE-SU-2025:21038-1","SUSE-SU-2025:21054-1","SUSE-SU-2025:21072-1","SUSE-SU-2025:21136-1","SUSE-SU-2025:3950-1","SUSE-SU-2025:3951-1","SUSE-SU-2025:4073-1","SUSE-SU-2025:4073-2","SUSE-SU-2025:4077-1","SUSE-SU-2025:4079-1","SUSE-SU-2025:4080-1","SUSE-SU-2025:4081-1","SUSE-SU-2026:0327-1","SUSE-SU-2026:20103-1","SUSE-SU-2026:20116-1","SUSE-SU-2026:20123-1","SUSE-SU-2026:20214-1","SUSE-SU-2026:20626-1","SUSE-SU-2026:20641-1","SUSE-SU-2026:21291-1","openSUSE-SU-2025:15705-1","openSUSE-SU-2025:20072-1","openSUSE-SU-2026:20072-1","openSUSE-SU-2026:20080-1","openSUSE-SU-2026:20140-1","openSUSE-SU-2026:20305-1"],"database_specific":{"cwe_ids":["CWE-363","CWE-61"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/52xxx/CVE-2025-52565.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/52xxx/CVE-2025-52565.json"},{"type":"ADVISORY","url":"https://github.com/opencontainers/runc/security/advisories/GHSA-qw9x-cqr3-wc7r"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-52565"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/01de9d65dc72f67b256ef03f9bfb795a2bf143b4"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/398955bccb7f20565c224a3064d331c19e422398"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/531ef794e4ecd628006a865ad334a048ee2b4b2e"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/9be1dbf4ac67d9840a043ebd2df5c68f36705d1d"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/aee7d3fe355dd02939d44155e308ea0052e0d53a"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/db19bbed5348847da433faa9d69e9f90192bfa64"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/de87203e625cd7a27141fb5f2ad00a320c69c5e8"},{"type":"FIX","url":"https://github.com/opencontainers/runc/commit/ff94f9991bd32076c871ef0ad8bc1b763458e480"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H"}]}