crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Feb 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 19 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 19 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | .krun_config.json symlink attack creates or overwrites file on the host in crun | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-19T16:46:31.602Z
Updated: 2025-02-19T16:56:05.966Z
Reserved: 2025-01-29T15:18:03.209Z
Link: CVE-2025-24965

Updated: 2025-02-19T16:56:01.799Z

Status : Received
Published: 2025-02-19T17:15:15.510
Modified: 2025-02-19T17:15:15.510
Link: CVE-2025-24965
