Bug 2353043 (CVE-2024-40635) - CVE-2024-40635 containerd: containerd has an integer overflow in User ID handling
Summary: CVE-2024-40635 containerd: containerd has an integer overflow in User ID hand...
Keywords:
Status: NEW
Alias: CVE-2024-40635
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2353077 2353080 2353082 2353094 2353095 2353098 2353099 2353100 2353101 2353103 2353104 2353105 2353076 2353078 2353079 2353081 2353083 2353084 2353085 2353086 2353087 2353088 2353089 2353090 2353091 2353092 2353093 2353096 2353097 2353102
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-17 22:01 UTC by OSIDB Bzimport
Modified: 2025-05-19 19:50 UTC (History)
81 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-03-17 22:01:17 UTC
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.


Note You need to log in before you can comment on or make changes to this bug.