CVE Vulnerabilities

CVE-2025-31133

UNIX Symbolic Link (Symlink) Following

Published: Nov 06, 2025 | Modified: Dec 03, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8.2 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the containers /dev/null) was actually a real /dev/null inode when using the containers /dev/null to mask. This exposes two methods of attack: an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.

Weakness

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.

Affected Software

NameVendorStart VersionEnd Version
RuncLinuxfoundation*1.2.8 (excluding)
RuncLinuxfoundation1.3.0 (including)1.3.3 (excluding)
RuncLinuxfoundation1.4.0-rc1 (including)1.4.0-rc1 (including)
RuncLinuxfoundation1.4.0-rc2 (including)1.4.0-rc2 (including)
Red Hat Enterprise Linux 8RedHatcontainer-tools:rhel8-8100020251112161627.afee755d*
Red Hat Enterprise Linux 9RedHatrunc-4:1.2.5-3.el9_6*
Red Hat Enterprise Linux 9RedHatrunc-4:1.3.0-4.el9_7*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatrunc-4:1.2.9-1.el9_4*
Red Hat OpenShift Container Platform 4.12RedHatrunc-4:1.2.9-1.rhaos4.17.el8*
Red Hat OpenShift Container Platform 4.13RedHatrunc-4:1.2.9-1.rhaos4.16.el9*
Red Hat OpenShift Container Platform 4.13RedHatrhcos-413.92.202511261311-0*
Red Hat OpenShift Container Platform 4.15RedHatrhcos-415.92.202512100122-0*
Red Hat OpenShift Container Platform 4.16RedHatrunc-4:1.2.9-1.rhaos4.16.el9*
Red Hat OpenShift Container Platform 4.16RedHatrhcos-416.94.202511191934-0*
Red Hat OpenShift Container Platform 4.17RedHatrunc-4:1.2.9-1.rhaos4.17.el9*
Red Hat OpenShift Container Platform 4.18RedHatrunc-4:1.2.9-1.rhaos4.18.el9*
Red Hat OpenShift Container Platform 4.18RedHatrhcos-418.94.202511170715-0*
RuncUbuntuesm-apps/bionic*
RuncUbuntuesm-apps/noble*
RuncUbuntuesm-apps/xenial*
RuncUbuntuesm-infra/focal*
RuncUbuntujammy*
RuncUbuntunoble*
RuncUbuntuplucky*
RuncUbuntuquesting*
RuncUbuntuupstream*
Runc-appUbuntudevel*
Runc-appUbuntuesm-apps/focal*
Runc-appUbuntuesm-apps/jammy*
Runc-appUbuntujammy*
Runc-appUbuntunoble*
Runc-appUbuntuplucky*
Runc-appUbuntuquesting*
Runc-appUbuntuupstream*
Runc-stableUbuntudevel*
Runc-stableUbuntuquesting*
Runc-stableUbuntuupstream*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References