Bug 2451576 (CVE-2026-30892) - CVE-2026-30892 crun: crun: Privilege escalation due to incorrect parsing of the `--user` option
Summary: CVE-2026-30892 crun: crun: Privilege escalation due to incorrect parsing of t...
Keywords:
Status: NEW
Alias: CVE-2026-30892
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2452162 2452163
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-26 01:01 UTC by OSIDB Bzimport
Modified: 2026-04-06 03:36 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:6621 0 None None None 2026-04-06 03:36:01 UTC
Red Hat Product Errata RHSA-2026:6622 0 None None None 2026-04-06 03:24:42 UTC

Description OSIDB Bzimport 2026-03-26 01:01:49 UTC
crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the  `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and  GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

Comment 4 errata-xmlrpc 2026-04-06 03:24:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:6622 https://access.redhat.com/errata/RHSA-2026:6622

Comment 5 errata-xmlrpc 2026-04-06 03:35:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:6621 https://access.redhat.com/errata/RHSA-2026:6621


Note You need to log in before you can comment on or make changes to this bug.