Name: crun
CVEs: CVE-2026-30892
CVSSs: n/a
Action Needed: update to >= 1.27
Summary: crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the crun exec option -u (--user) is incorrectly parsed. The value 1 is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
See also https://bugzilla.redhat.com/show_bug.cgi?id=2451576.
refmap.gentoo: TBD
Name: crun
CVEs: CVE-2026-30892
CVSSs: n/a
Action Needed: update to >= 1.27
Summary: crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the
crun execoption-u(--user) is incorrectly parsed. The value1is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.See also https://bugzilla.redhat.com/show_bug.cgi?id=2451576.
refmap.gentoo: TBD