Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-40635

Опубликовано: 17 мар. 2025
Источник: redhat
CVSS3: 4.6
EPSS Низкий

Описание

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

A flaw was found in containerd package. Containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This issue could cause unexpected behavior for environments that require containers to run as a non-root user.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-190: Integer Overflow or Wraparound vulnerability, and therefore, downgrades the severity of this particular CVE from Moderate to Low. Baseline configurations and configuration controls enforce secure system and software settings, while least functionality reduces the attack surface by disabling unnecessary services and ports. In the event of successful exploitation, process isolation ensures that memory corruption is contained within the originating process, preventing it from affecting other processes or the system as a whole. The environment leverages malicious code protections such as IPS/IDS and anti-malware solutions. These controls help detect and prevent malicious code that attempts to exploit integer overflow vulnerabilities through mechanisms like file integrity checks and patch management. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are used to enhance resilience against integer overflows and denial of service attacks.

Меры по смягчению последствий

To mitigate this vulnerability, ensure that only trusted images are used and that only trusted users have permissions to import images.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Assisted Installer for Red Hat OpenShift Container Platform 2rhai-tech-preview/assisted-installer-agent-rhel8Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-acmesolver-rhel9Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-rhel9Fix deferred
Deployment Validation Operatordeployment-validation-operator-containerFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel9Fix deferred
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-validation-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-agent-rhel8Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-controller-rhel8Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-rhel8Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/assisted-service-8-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=2353043containerd: containerd has an integer overflow in User ID handling

EPSS

Процентиль: 2%
0.00014
Низкий

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.6
ubuntu
6 месяцев назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
nvd
6 месяцев назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
msrc
4 месяца назад

Описание отсутствует

CVSS3: 4.6
debian
6 месяцев назад

containerd is an open-source container runtime. A bug was found in con ...

suse-cvrf
5 месяцев назад

Security update for containerd

EPSS

Процентиль: 2%
0.00014
Низкий

4.6 Medium

CVSS3