Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-40635

Опубликовано: 17 мар. 2025
Источник: redhat
CVSS3: 4.6
EPSS Низкий

Описание

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

A flaw was found in containerd package. Containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This issue could cause unexpected behavior for environments that require containers to run as a non-root user.

Отчет

For Red Hat OpenShift GitOps and OpenShift Container Platform deployments, image sources are controlled through OpenShift's Image configuration and RBAC policies. Administrators can restrict image imports to trusted registries using allowedRegistriesForImport and registrySources configuration.In typical GitOps deployments, application images are pulled from pre-approved registries configured by platform administrators.

Меры по смягчению последствий

To mitigate this vulnerability, ensure that only trusted images are used and that only trusted users have permissions to import images. To implement the recommended controls in OpenShift:

  1. Restrict allowed registries at the cluster level by configuring image.config.openshift.io/cluster with allowedRegistriesForImport and registrySources.allowedRegistries.
  2. To find out who can pull/import container images into OpenShift for that namespace Based on RBAC permissions: oc adm policy who-can create imagestreamimports -n <namespace>
  3. Enforce image signature verification using sigstore or cluster image signature policies.
  4. For GitOps deployments, use Gatekeeper/OPA policies to enforce that ArgoCD Applications reference only approved registries.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Assisted Installer for Red Hat OpenShift Container Platform 2rhai-tech-preview/assisted-installer-agent-rhel8Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-acmesolver-rhel9Fix deferred
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-rhel9Fix deferred
Deployment Validation Operatordeployment-validation-operator-containerFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel9Fix deferred
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-validation-rhel9Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/assisted-service-8-rhel8Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/assisted-service-9-rhel9Fix deferred
Network Observability Operatornetwork-observability/network-observability-cli-rhel9Fix deferred
OpenShift Developer Tools and Servicesjenkins-agent-base-containerFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=2353043containerd: containerd has an integer overflow in User ID handling

EPSS

Процентиль: 3%
0.00014
Низкий

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.6
ubuntu
около 1 года назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
nvd
около 1 года назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
msrc
11 месяцев назад

containerd has an integer overflow in User ID handling

CVSS3: 4.6
debian
около 1 года назад

containerd is an open-source container runtime. A bug was found in con ...

suse-cvrf
12 месяцев назад

Security update for containerd

EPSS

Процентиль: 3%
0.00014
Низкий

4.6 Medium

CVSS3