CVE-2026-30892

Source
https://cve.org/CVERecord?id=CVE-2026-30892
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30892.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-30892
Aliases
  • GHSA-4vg2-xjqj-7chj
Downstream
Related
Published
2026-03-25T23:57:01.741Z
Modified
2026-04-07T12:59:23.198291499Z
Severity
  • 0.0 (None) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N CVSS Calculator
Summary
Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation
Details

crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the crun exec option -u (--user) is incorrectly parsed. The value 1 is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

Database specific
{
    "cwe_ids": [
        "CWE-269"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30892.json"
}
References

Affected packages

Git / github.com/containers/crun

Affected ranges

Type
GIT
Repo
https://github.com/containers/crun
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.19"
        },
        {
            "fixed": "1.27"
        }
    ]
}

Affected versions

1.*
1.19
1.19.1
1.20
1.21
1.22
1.23
1.23.1
1.24
1.25
1.25.1
1.26

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30892.json"