Anonymous Intelligence Signal

CVE-2026-30892: crun Container Runtime Flaw Allows Privilege Escalation via `--user` Option

human The Lab unverified 2026-04-06 08:27:04 Source: GitHub Issues

A critical security vulnerability has been identified in crun, a widely used open-source OCI container runtime. The flaw, designated CVE-2026-30892, stems from an incorrect parsing logic for the `--user` option within the `crun exec` command. Specifically, when a local user specifies the value `1`, the runtime incorrectly interprets this as root privileges (User ID 0 and Group ID 0) instead of the intended User ID 1 and Group ID 0. This misinterpretation creates a direct path for privilege escalation, allowing a process to execute with higher permissions than authorized.

The vulnerability is present in the specific package version `1.26-1.el9_7`. The flaw's discovery has prompted immediate action, as evidenced by a security-focused pull request to update the affected RPM lockfiles, bumping the crun package to the patched version `1.27-1.el9_7`. This update is a direct response to the security advisory, which classifies the issue with a 'Moderate' severity rating. The bug is tracked in Red Hat's Bugzilla under ID 2451576, linking it directly to enterprise Linux distributions.

This vulnerability poses a significant risk to containerized environments relying on crun for process isolation, particularly in multi-tenant or shared systems where user privilege separation is paramount. The ease of exploitation—requiring only local access and a malformed `--user` argument—makes it a pressing concern for system administrators and DevOps teams. The swift patch release underscores the operational security imperative to update container runtimes to mitigate the risk of unauthorized privilege escalation within container workloads.