A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-52881

CVE-2025-52881: runc Race Condition Vulnerability

CVE-2025-52881 is a race condition vulnerability in Linuxfoundation runc that allows attackers to misdirect procfs writes. This post explains the technical details, affected versions, impact, and mitigation steps.

Published: February 6, 2026

CVE-2025-52881 Overview

CVE-2025-52881 is a race condition vulnerability in runc, the widely-used CLI tool for spawning and running containers according to the Open Container Initiative (OCI) specification. This vulnerability allows an attacker to trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts. The attack has been verified to be exploitable using standard Dockerfiles with docker buildx build, which permits triggering parallel execution of containers with custom shared mounts configured.

Critical Impact

Attackers can exploit this race condition to redirect procfs writes through symbolic links in a tmpfs or via bind-mounts, potentially compromising container isolation and enabling privilege escalation or system manipulation.

Affected Products

  • Linux Foundation runc versions prior to 1.2.8
  • Linux Foundation runc versions 1.3.0 through 1.3.2
  • Linux Foundation runc versions 1.4.0-rc1 and 1.4.0-rc2

Discovery Timeline

  • November 6, 2025 - CVE-2025-52881 published to NVD
  • December 3, 2025 - Last updated in NVD database

Technical Details for CVE-2025-52881

Vulnerability Analysis

This vulnerability is classified as CWE-61 (UNIX Symbolic Link Following), representing a symlink attack in the context of container runtime operations. The flaw exists in how runc handles writes to /proc filesystem during container initialization when shared mounts are in use.

The vulnerability is particularly concerning because it bypasses a previous mitigation applied for CVE-2019-19921. That earlier fix was fairly limited and effectively only caused runc to verify that when LSM (Linux Security Module) labels are written, they are actually procfs files. However, the current vulnerability demonstrates that an attacker can still redirect these writes through race conditions during parallel container execution.

The attack requires local access with low privileges and user interaction, but successful exploitation can lead to high impact on confidentiality, integrity, and availability of both the vulnerable container and potentially other containers sharing the same host.

Root Cause

The root cause lies in insufficient validation of procfs file operations when containers with shared mounts execute in parallel. The race condition occurs during the window between when runc checks the path and when it writes to the procfs file, allowing symbolic link substitution. The previous fix for CVE-2019-19921 only verified that LSM labels were being written to actual procfs files but did not account for race conditions in shared mount scenarios.

Attack Vector

The attack exploits the local attack vector through shared mount configurations during container builds. An attacker can configure a malicious container that races with legitimate container operations, substituting symbolic links in a tmpfs or using bind-mounts to redirect procfs writes to arbitrary locations. This can be triggered through standard docker buildx build operations with custom shared mount configurations.

go
// Security patch in libcontainer/apparmor/apparmor_linux.go - apparmor: use safe procfs API for labels
 	"os"
 	"sync"
 
+	"golang.org/x/sys/unix"
+
+	"github.com/opencontainers/runc/internal/pathrs"
 	"github.com/opencontainers/runc/libcontainer/utils"
 )

Source: GitHub Commit fdcc9d3cad2

go
// Security patch in libcontainer/rootfs_linux.go - rootfs: re-allow dangling symlinks in mount targets
 		dstIsFile = !fi.IsDir()
 	}

+	// In previous runc versions, we would tolerate nonsense paths with
+	// dangling symlinks as path components. pathrs-lite does not support
+	// this, so instead we have to emulate this behaviour by doing
+	// SecureJoin *purely to get a semi-reasonable path to use* and then we
+	// use pathrs-lite to operate on the path safely.
+	newUnsafePath, err := securejoin.SecureJoin(rootfs, unsafePath)
+	if err != nil {
+		return err
+	}
+	unsafePath = utils.StripRoot(rootfs, newUnsafePath)

 	if dstIsFile {
 		dstFile, err = pathrs.CreateInRoot(rootfs, unsafePath, unix.O_CREAT|unix.O_EXCL|unix.O_NOFOLLOW, 0o644)
 	} else {

Source: GitHub Commit 3f925525b44d

Detection Methods for CVE-2025-52881

Indicators of Compromise

  • Suspicious symbolic links appearing in tmpfs mounts within container environments
  • Unexpected writes to procfs files outside of normal container initialization patterns
  • Unusual parallel container execution with shared mount configurations
  • Evidence of bind-mount manipulation during container build processes

Detection Strategies

  • Monitor for containers configured with shared mounts, especially during docker buildx build operations
  • Implement file integrity monitoring on procfs-related paths within container runtimes
  • Audit container configurations for custom shared mount settings that could enable race conditions
  • Deploy runtime security solutions that detect symlink manipulation in container contexts

Monitoring Recommendations

  • Enable detailed logging for runc operations, particularly around procfs writes and mount operations
  • Monitor for rapid creation and deletion of symbolic links in container mount namespaces
  • Implement alerts for containers with unusual mount configurations being executed in parallel
  • Track runc version deployments across your infrastructure to identify vulnerable instances

How to Mitigate CVE-2025-52881

Immediate Actions Required

  • Upgrade runc to patched versions: 1.2.8, 1.3.3, or 1.4.0-rc.3 immediately
  • Audit container build configurations for shared mount usage and restrict where possible
  • Review container orchestration settings for parallel execution with custom mounts
  • Implement runtime container security monitoring to detect exploitation attempts

Patch Information

The vulnerability is fixed in runc versions 1.2.8, 1.3.3, and 1.4.0-rc.3. The patches include updates to the filepath-securejoin dependency (upgraded from v0.5.0 to v0.5.1) and improvements to the safe procfs API for label operations. Multiple commits address different aspects of the fix:

  • GitHub Commit a41366e74080 - Dependency update for openat2 resilience
  • GitHub Commit fdcc9d3cad2 - AppArmor safe procfs API implementation

For complete details, see the GitHub Security Advisory GHSA-qw9x-cqr3-wc7r.

Workarounds

  • Disable or restrict shared mount configurations in container builds until patches can be applied
  • Avoid using docker buildx build with custom shared mount configurations on untrusted content
  • Implement additional isolation between containers that may execute in parallel
  • Use container security policies to limit mount namespace sharing
text
# Dependency update in go.mod showing filepath-securejoin security fix
 	github.com/checkpoint-restore/go-criu/v7 v7.2.0
 	github.com/containerd/console v1.0.5
 	github.com/coreos/go-systemd/v22 v22.6.0
-	github.com/cyphar/filepath-securejoin v0.5.0
+	github.com/cyphar/filepath-securejoin v0.5.1
 	github.com/docker/go-units v0.5.0
 	github.com/godbus/dbus/v5 v5.1.0
 	github.com/moby/sys/capability v0.4.0

Source: GitHub Commit a41366e74080

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechRunc

  • SeverityHIGH

  • CVSS Score7.3

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-61
  • Vendor Resources
  • GitHub Commit a41366e74080

  • GitHub Commit fdcc9d3cad2

  • GitHub Release Notes for v1.4.0-rc.2

  • GitHub Commit 3f925525b44d

  • GitHub Commit 435cc81be6b7

  • GitHub Commit 44a0fcf685db

  • GitHub Commit 4b37cd93f86e

  • GitHub Commit 6fc191449109

  • GitHub Commit 77889b56db93

  • GitHub Commit 77d217c7c377

  • GitHub Commit b3dd1bc562ed

  • GitHub Commit d40b3439a961

  • GitHub Commit d61fd29d8544

  • GitHub Commit db19bbed5348

  • GitHub Commit ed6b1693b8b3

  • GitHub Commit ff6fe1324663

  • GitHub Commit ff94f9991bd3

  • GitHub Security Advisory GHSA-9493-h29p-rfm2

  • GitHub Security Advisory GHSA-cgrx-mc8f-2prm

  • GitHub Security Advisory GHSA-qw9x-cqr3-wc7r
  • Related CVEs
  • CVE-2025-31133

  • CVE-2024-45310

  • CVE-2024-21626

  • CVE-2023-27561
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use