Race Condition Enabling Link Following Affecting github.com/opencontainers/runc/internal/third_party/selinux/go-selinux/label package, versions <1.2.8>=1.3.0-rc.1 <1.3.3>=1.4.0-rc.1 <1.4.0-rc.3


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENCONTAINERSRUNCINTERNALTHIRDPARTYSELINUXGOSELINUXLABEL-13843569
  • published6 Nov 2025
  • disclosed5 Nov 2025
  • creditTõnis Tiigi, Aleksa Sarai, lfbzhm

Introduced: 5 Nov 2025

NewCVE-2025-52881  (opens in a new tab)
CWE-363  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade github.com/opencontainers/runc/internal/third_party/selinux/go-selinux/label to version 1.2.8, 1.3.3, 1.4.0-rc.3 or higher.

Overview

Affected versions of this package are vulnerable to Race Condition Enabling Link Following in the handling of procfs file writes. An attacker can cause arbitrary writes to sensitive files or trigger a denial of service by redirecting write operations through race conditions and manipulating shared mounts or symbolic links. This can result in bypassing security mechanisms, escalating privileges, or crashing the host system by targeting files such as /proc/sysrq-trigger or altering kernel parameters.

Workaround

This vulnerability can be mitigated by:

  1. Do not run untrusted container images from unknown or unverified sources.

  2. Using rootless containers.

CVSS Base Scores

version 4.0
version 3.1