VYPR
Unrated severityNVD Advisory· Published Mar 25, 2026· Updated Mar 26, 2026

Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation

CVE-2026-30892

Description

crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the crun exec option -u (--user) is incorrectly parsed. The value 1 is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

Affected products

2
  • Containers/Crunllm-fuzzy
    Range: 1.19 - 1.26
  • containers/crunv5
    Range: >= 1.19, < 1.27

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.