Crun Project Crun vulnerabilities

3 known vulnerabilities affecting crun_project/crun.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3

Vulnerabilities

Page 1 of 1
CVE-2026-30892HIGHCVSS 7.8≥ 1.19, < 1.272026-03-26
CVE-2026-30892 [HIGH] CWE-269 CVE-2026-30892: crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
nvdosv
CVE-2022-27650HIGHCVSS 7.5fixed in 1.4.4vAffects crun v1.4.3 and prior, Fixed in – v1.4.42022-04-04
CVE-2022-27650 [HIGH] CWE-276 CVE-2022-27650: A flaw was found in crun where containers were incorrectly started with non-empty default permission A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate thos
cvelistv5nvdosv
CVE-2019-18837HIGHCVSS 8.6fixed in 0.10.52019-11-13
CVE-2019-18837 [HIGH] CWE-59 CVE-2019-18837: An issue was discovered in crun before 0.10.5. With a crafted image, it doesn't correctly check whet An issue was discovered in crun before 0.10.5. With a crafted image, it doesn't correctly check whether a target is a symlink, resulting in access to files outside of the container. This occurs in libcrun/linux.c and libcrun/chroot_realpath.c.
nvd