crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Title Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T23:57:01.741Z

Reserved: 2026-03-06T00:04:56.701Z

Link: CVE-2026-30892

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T00:16:38.953

Modified: 2026-03-26T00:16:38.953

Link: CVE-2026-30892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses