Description
crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/containers/crun/security/advisories/GHSA-f42g-r5jj-qh4j
Patch x_refsource_misc
https://github.com/containers/crun/commit/0aec82c2b686f0b1793deed43b46524fe2e8b5a7
Release Notes x_refsource_misc
https://github.com/containers/crun/releases/tag/1.20
Scores
CVSS v4
8.5
EPSS
0.0022
EPSS Percentile
44.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (1)
containers/crun
< 1.20
Published
Feb 19, 2025
Tracked Since
Feb 18, 2026