CVE-2026-30892

high

Description

crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

References

https://github.com/containers/crun/security/advisories/GHSA-4vg2-xjqj-7chj

https://github.com/containers/crun/releases/tag/1.27

https://github.com/containers/crun/commit/1bd7f42446999b0e76bc3d575392e05c943b0b01

Details

Source: Mitre, NVD

Published: 2026-03-26

Updated: 2026-03-26

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00012