Source: crun
Version: 1.26-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 1.21-1

Hi,

The following vulnerability was published for crun.

CVE-2026-30892[0]:
| crun is an open source OCI Container Runtime fully written in C. In
| versions 1.19 through 1.26, the  `crun exec` option `-u` (`--user`)
| is incorrectly parsed. The value `1` is interpreted as UID 0 and GID
| 0 when it should have been UID 1 and  GID 0. The process thus runs
| with higher privileges than expected. Version 1.27 patches the
| issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-30892
    https://www.cve.org/CVERecord?id=CVE-2026-30892
[1] https://github.com/containers/crun/security/advisories/GHSA-4vg2-xjqj-7chj

Regards,
Salvatore

Reply via email to