CVE-2025-52565
Podman Analyse et atténuation des vulnérabilités

Aperçu

CVE-2025-52565 is a container escape vulnerability discovered in runc that affects versions >=v1.0.0-rc3 through 1.2.7, 1.3.2, and 1.4.0-rc2. The vulnerability stems from insufficient checks when bind-mounting /dev/pts/$n to /dev/console inside containers, which occurs before maskedPaths and readonlyPaths are applied (GHSA Advisory).

Détails techniques

The vulnerability allows an attacker to trick runc into bind-mounting paths that would normally be made read-only or be masked onto a path that the attacker can write to. While this happens after pivotroot(2) and cannot be used to write to host files directly, it can lead to denial of service or container breakout by providing the attacker with writable access to sensitive files like /proc/sysrq-trigger or /proc/sys/kernel/corepattern. The vulnerability has been assigned a CVSS v4.0 score of 7.3 (High) with vector CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H (GHSA Advisory).

Impact

The successful exploitation of this vulnerability can lead to container breakout, allowing an attacker to escape container isolation. Additionally, it can be used for denial of service attacks against the host system. The attack provides the attacker with write access to typically restricted files, which can be leveraged to compromise host system security (GHSA Advisory).

Atténuation et solutions de contournement

Several mitigations are available: 1) Use containers with user namespaces where the host root user is not mapped into the container's user namespace, 2) Configure containers to not permit processes to run with root privileges and enable noNewPrivileges, 3) Avoid running untrusted container images from unknown sources, 4) Update to patched versions: runc 1.2.8, 1.3.3, or 1.4.0-rc.3. The default SELinux policy provides some mitigation, though this can be bypassed when combined with CVE-2025-52881 (GHSA Advisory).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté Podman Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-52565HIGH8.4
  • PodmanPodman
  • sriov-network-device-plugin
NonOuiNov 06, 2025
CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • kubeflow
NonOuiOct 29, 2025
CVE-2025-52881HIGH7.3
  • DockerDocker
  • k8s-device-plugin-fips
NonOuiNov 06, 2025
CVE-2025-31133HIGH7.3
  • PodmanPodman
  • runc
NonOuiNov 06, 2025
CVE-2025-61724MEDIUM5.3
  • cAdvisorcAdvisor
  • boring-registry-fips
NonOuiOct 29, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités