RLSA-2025:20957

Source
https://errata.rockylinux.org/RLSA-2025:20957
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2025:20957.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2025:20957
Upstream
Published
2025-11-21T18:13:51.682496Z
Modified
2025-11-21T18:49:01.384979Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Important: runc security update
Details

The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

  • runc: container escape via 'masked path' abuse due to mount race conditions (CVE-2025-31133)

  • runc: container escape with malicious config due to /dev/console mount and related races (CVE-2025-52565)

  • runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / runc

Package

Name
runc
Purl
pkg:rpm/rocky-linux/runc?distro=rocky-linux-9&epoch=4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4:1.3.0-4.el9_7
Database specific
{
    "yum_repository": "AppStream"
}