Skip to content

update: crun #2061

@dongsupark

Description

@dongsupark

Name: crun
CVEs: CVE-2026-30892
CVSSs: n/a
Action Needed: update to >= 1.27

Summary: crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the crun exec option -u (--user) is incorrectly parsed. The value 1 is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.

See also https://bugzilla.redhat.com/show_bug.cgi?id=2451576.

refmap.gentoo: TBD

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    Status

    🪵Backlog

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions