HomeCloud ComputingRuntime bugs break container partitions, enabling root on Docker hosts

Runtime bugs break container partitions, enabling root on Docker hosts



Console and Write-Gadget Lurkers: CVE-2025-52565 & CVE-2025-52881

The second vulnerability, tracked as CVE-2025-52565, targets “/dev/console” bind-mount dealing with. An attacker can change the goal path with a symlink, which is able to trigger runc to bind-mount the fallacious goal, permitting the attacker to realize write entry to procfs paths.

“As with CVE-2025-31133, this occurs after pivot_root(2) and so can’t be used to bind-mount host recordsdata instantly, however an attacker can trick runc into making a read-write bind-mount of /proc/sys/kernel/core_pattern or /proc/sysrq-trigger, main to a whole container breakout,” Sarai stated, including that variations 1.0.0-rc3 and later stay weak.

The third flaw (CVE-2025-52881) permits an attacker to bypass Linux Safety Modules (LSM) comparable to SELinux or AppArmor by redirecting writes to procfs recordsdata. As soon as the LSM labels are successfully neutered, writes to host-level procfs change into potential, enabling full host compromise.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments