CVE-2024-40635

ADVISORY - github

Summary

Impact

A bug was found in containerd where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user.

Patches

This bug has been fixed in the following containerd versions:

Users should update to these versions to resolve the issue.

Workarounds

Ensure that only trusted images are used and that only trusted users have permissions to import images.

Credits

The containerd project would like to thank Benjamin Koltermann and emxll for responsibly disclosing this issue in accordance with the containerd security policy.

References

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

EPSS Score: 0.00014 (0.020)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Integer Overflow or Wraparound

ADVISORY - github

Integer Overflow or Wraparound

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Integer Overflow or Wraparound

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Integer Overflow or Wraparound


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in