CVE-2026-30892
EUVD-2026-1602626.03.2026, 00:16
crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| crun_project | crun | 1.19 ≤ 𝑥 < 1.27 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration