A flaw was found in runc. This flaw exploits an issue with how masked paths are implementedin runc. When masking files, runc will bind-mount the container's /dev/null inode on top of the file. However, if an attacker can replace /dev/null with a symlink to some other procfs file, runc will instead bind-mount the symlink target read-write.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:19927 https://access.redhat.com/errata/RHSA-2025:19927
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:20957 https://access.redhat.com/errata/RHSA-2025:20957
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:21232 https://access.redhat.com/errata/RHSA-2025:21232
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2025:21328 https://access.redhat.com/errata/RHSA-2025:21328
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2025:21795 https://access.redhat.com/errata/RHSA-2025:21795
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2025:21824 https://access.redhat.com/errata/RHSA-2025:21824
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2025:22275 https://access.redhat.com/errata/RHSA-2025:22275
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2025:23113 https://access.redhat.com/errata/RHSA-2025:23113