Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-40635

Опубликовано: 17 мар. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 4.6

Описание

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

РелизСтатусПримечание
devel

needed

esm-apps/bionic

released

1.6.12-0ubuntu1~18.04.1+esm2
esm-apps/noble

released

1.6.24~ds1-1ubuntu1.2+esm1
esm-apps/xenial

released

1.2.6-0ubuntu1~16.04.6+esm5
esm-infra/focal

not-affected

1.6.12-0ubuntu1~20.04.8
focal

released

1.6.12-0ubuntu1~20.04.8
jammy

released

1.6.12-0ubuntu1~22.04.8
noble

needed

oracular

needed

plucky

needed

Показывать по

РелизСтатусПримечание
devel

released

2.0.2-0ubuntu2
esm-infra/focal

DNE

focal was released [1.7.24-0ubuntu1~20.04.2]
focal

released

1.7.24-0ubuntu1~20.04.2
jammy

released

1.7.24-0ubuntu1~22.04.2
noble

released

1.7.24-0ubuntu1~24.04.2
oracular

released

2.0.0~rc3-0ubuntu1.1
plucky

released

2.0.2-0ubuntu2
upstream

released

2.0.4

Показывать по

EPSS

Процентиль: 1%
0.00009
Низкий

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.6
redhat
3 месяца назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
nvd
3 месяца назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
msrc
около 2 месяцев назад

Описание отсутствует

CVSS3: 4.6
debian
3 месяца назад

containerd is an open-source container runtime. A bug was found in con ...

suse-cvrf
2 месяца назад

Security update for containerd

EPSS

Процентиль: 1%
0.00009
Низкий

4.6 Medium

CVSS3

Уязвимость CVE-2024-40635