crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Containers
Containers crun
Vendors & Products Containers
Containers crun

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
Title Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T18:10:16.318Z

Reserved: 2026-03-06T00:04:56.701Z

Link: CVE-2026-30892

cve-icon Vulnrichment

Updated: 2026-03-26T18:09:59.199Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T00:16:38.953

Modified: 2026-03-26T15:13:15.790

Link: CVE-2026-30892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:09:03Z

Weaknesses