CVE-2026-30892

crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:crun_project:crun:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-26 00:16

Updated : 2026-03-27 20:29


NVD link : CVE-2026-30892

Mitre link : CVE-2026-30892

CVE.ORG link : CVE-2026-30892


JSON object : View

Products Affected

crun_project

  • crun
CWE
CWE-269

Improper Privilege Management