crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0.
The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 1
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Crun_Project Crun
cpe:2.3:a:crun_project:crun:*:*:*:*:*:*:*:*
|
1.19
|
<= 1.27
|