CVE-2025-2713
📋 TL;DR
This CVE describes a local privilege escalation vulnerability in Google gVisor's runsc component where incorrect file permission handling allowed unprivileged users to access restricted files. The vulnerability occurred because processes initially ran with elevated permissions before the first fork. This affects systems using vulnerable versions of gVisor's runsc component.
💻 Affected Systems
- Google gVisor runsc
📦 What is this software?
Gvisor by Google
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access could escalate privileges to root-equivalent level, potentially gaining full control over the container environment and accessing sensitive host files.
Likely Case
Local users could access files they shouldn't have permission to view, potentially exposing configuration files, secrets, or other sensitive data within the container environment.
If Mitigated
With proper container isolation and minimal user privileges, impact would be limited to the container's filesystem rather than the host system.
🎯 Exploit Status
Exploitation requires local access and knowledge of the vulnerability. The attacker needs to be able to run processes within the container environment.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Commit 586c38d70081b13b2ed494cef48e99b93956843e and later
Vendor Advisory: https://github.com/google/gvisor/commit/586c38d70081b13b2ed494cef48e99b93956843e
Restart Required: No
Instructions:
1. Update gVisor to version containing commit 586c38d70081b13b2ed494cef48e99b93956843e
2. Rebuild and redeploy containers using the updated runsc component
3. Verify the fix by checking runsc version
🔧 Temporary Workarounds
Restrict container privileges
allRun containers with minimal privileges using security contexts and user namespaces
docker run --user 1000:1000 --security-opt=no-new-privileges image_name
🧯 If You Can't Patch
- Implement strict access controls to limit who can run containers on affected systems
- Monitor for suspicious file access patterns within container environments
🔍 How to Verify
Check if Vulnerable:
Check if runsc version predates commit 586c38d70081b13b2ed494cef48e99b93956843e
Check Version:
runsc --version
Verify Fix Applied:
Verify runsc version includes commit 586c38d70081b13b2ed494cef48e99b93956843e or later
📡 Detection & Monitoring
Log Indicators:
- Unexpected file access patterns from non-privileged users in container logs
- Failed permission checks in gVisor/runsc logs
Network Indicators:
- N/A - Local privilege escalation
SIEM Query:
search for 'permission denied' or 'access violation' in container runtime logs from non-root users