A flaw was found in runc. This flaw exploits an issue with how masked paths are implementedin runc. When masking files, runc will bind-mount the container's /dev/null inode on top of the file. However, if an attacker can replace /dev/null with a symlink to some other procfs file, runc will instead bind-mount the symlink target read-write.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:19927 https://access.redhat.com/errata/RHSA-2025:19927
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:20957 https://access.redhat.com/errata/RHSA-2025:20957
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:21232 https://access.redhat.com/errata/RHSA-2025:21232