{"id":"CVE-2026-30892","summary":"Crun incorrectly parses `crun exec` option `-u`, leading to privilege escalation","details":"crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the  `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and  GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.","aliases":["GHSA-4vg2-xjqj-7chj"],"modified":"2026-04-10T05:41:57.496750Z","published":"2026-03-25T23:57:01.741Z","related":["ALSA-2026:6621","ALSA-2026:6622"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30892.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-269"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/30xxx/CVE-2026-30892.json"},{"type":"FIX","url":"https://github.com/containers/crun/commit/1bd7f42446999b0e76bc3d575392e05c943b0b01"},{"type":"WEB","url":"https://github.com/containers/crun/releases/tag/1.27"},{"type":"ADVISORY","url":"https://github.com/containers/crun/security/advisories/GHSA-4vg2-xjqj-7chj"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-30892"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/containers/crun","events":[{"introduced":"db31c42ac46e20b5527f5339dcbf6f023fcd539c"},{"fixed":"a718a92cc9a94955a5a550b6fdec1378c247ec50"}],"database_specific":{"versions":[{"introduced":"1.19"},{"fixed":"1.27"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-30892.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N"}]}