Unrated severityNVD Advisory· Published Mar 25, 2026· Updated Mar 26, 2026
Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation
CVE-2026-30892
Description
crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the crun exec option -u (--user) is incorrectly parsed. The value 1 is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Affected products
2- Range: 1.19 - 1.26
- containers/crunv5Range: >= 1.19, < 1.27
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/containers/crun/commit/1bd7f42446999b0e76bc3d575392e05c943b0b01mitrex_refsource_MISC
- github.com/containers/crun/releases/tag/1.27mitrex_refsource_MISC
- github.com/containers/crun/security/advisories/GHSA-4vg2-xjqj-7chjmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.