HomeVulnerabilityRuntime bugs break container partitions, enabling root on Docker hosts

Runtime bugs break container partitions, enabling root on Docker hosts

Console and Write-Gadget Lurkers: CVE-2025-52565 & CVE-2025-52881

The second vulnerability, tracked as CVE-2025-52565, targets “/dev/console” bind-mount dealing with. An attacker can change the goal path with a symlink, which is able to trigger runc to bind-mount the fallacious goal, permitting the attacker to achieve write entry to procfs paths.

“As with CVE-2025-31133, this occurs after pivot_root(2) and so can’t be used to bind-mount host recordsdata instantly, however an attacker can trick runc into making a read-write bind-mount of /proc/sys/kernel/core_pattern or /proc/sysrq-trigger, main to a whole container breakout,” Sarai mentioned, including that variations 1.0.0-rc3 and later stay weak.

The third flaw (CVE-2025-52881) permits an attacker to bypass Linux Safety Modules (LSM) reminiscent of SELinux or AppArmor by redirecting writes to procfs recordsdata. As soon as the LSM labels are successfully neutered, writes to host-level procfs turn into potential, enabling full host compromise.

See also  AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular