CVE-2025-27612

5.9 MEDIUM

📋 TL;DR

This vulnerability in libcontainer allows tenant containers to inherit capabilities from the main container, potentially leading to privilege escalation. Only users who directly use libcontainer's tenant builder functionality are affected. The youki binary itself is not vulnerable.

💻 Affected Systems

Products:
  • libcontainer (youki project)
Versions: libcontainer versions prior to 0.5.3
Operating Systems: Linux
Default Config Vulnerable: ✅ No
Notes: Only affects users who directly use libcontainer's tenant builder functionality. The youki binary itself is not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain elevated capabilities within a tenant container, potentially breaking container isolation and accessing host resources or other containers.

🟠

Likely Case

Accidental capability inheritance leading to unintended container permissions and potential security boundary violations.

🟢

If Mitigated

With proper capability restrictions and container isolation controls, impact would be limited to the specific tenant container.

🌐 Internet-Facing: LOW - This requires direct use of libcontainer's tenant builder API, not typically exposed to internet-facing services.
🏢 Internal Only: MEDIUM - Internal container orchestration systems using libcontainer directly could be affected if tenant builder is used.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of libcontainer's tenant builder API and container capability management.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: libcontainer 0.5.3

Vendor Advisory: https://github.com/youki-dev/youki/security/advisories/GHSA-5w4j-f78p-4wh9

Restart Required: Yes

Instructions:

1. Update libcontainer dependency to version 0.5.3 or later. 2. Rebuild any applications using libcontainer. 3. Restart containers using the updated library.

🔧 Temporary Workarounds

Avoid tenant builder usage

linux

Do not use libcontainer's tenant builder functionality until patched

Capability restriction

linux

Explicitly set minimal capabilities for tenant containers

Set minimal capabilities in tenant container spec: "capabilities": {"bounding": ["CAP_CHOWN"], ...}

🧯 If You Can't Patch

  • Audit all usage of libcontainer's tenant builder and ensure minimal capabilities are set
  • Implement additional container isolation controls and monitor for unusual capability usage

🔍 How to Verify

Check if Vulnerable:

Check libcontainer version in Cargo.toml or run: cargo tree | grep libcontainer

Check Version:

cargo tree | grep libcontainer

Verify Fix Applied:

Verify libcontainer version is 0.5.3 or later: cargo tree | grep "libcontainer 0.5.3"

📡 Detection & Monitoring

Log Indicators:

  • Unusual capability assignments in container creation logs
  • Tenant containers running with unexpected capabilities

Network Indicators:

  • None specific - this is a local privilege issue

SIEM Query:

Search for container creation events with tenant builder usage and capability modifications

🔗 References

📤 Share & Export