Логотип exploitDog
bind: "CVE-2024-40635"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-40635"

Количество 10

Количество 10

ubuntu логотип

CVE-2024-40635

3 месяца назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
EPSS: Низкий
redhat логотип

CVE-2024-40635

3 месяца назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
EPSS: Низкий
nvd логотип

CVE-2024-40635

3 месяца назад

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
EPSS: Низкий
msrc логотип

CVE-2024-40635

около 2 месяцев назад

CVSS3: 4.6
EPSS: Низкий
debian логотип

CVE-2024-40635

3 месяца назад

containerd is an open-source container runtime. A bug was found in con ...

CVSS3: 4.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1346-1

2 месяца назад

Security update for containerd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1345-1

2 месяца назад

Security update for containerd

EPSS: Низкий
redos логотип

ROS-20250424-08

около 2 месяцев назад

Уязвимость containerd

CVSS3: 4.6
EPSS: Низкий
github логотип

GHSA-265r-hfxg-fhmg

3 месяца назад

containerd has an integer overflow in User ID handling

CVSS3: 4.6
EPSS: Низкий
fstec логотип

BDU:2025-05194

3 месяца назад

Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVSS3: 4.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-40635

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
0%
Низкий
3 месяца назад
redhat логотип
CVE-2024-40635

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
0%
Низкий
3 месяца назад
nvd логотип
CVE-2024-40635

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS3: 4.6
0%
Низкий
3 месяца назад
msrc логотип
CVSS3: 4.6
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2024-40635

containerd is an open-source container runtime. A bug was found in con ...

CVSS3: 4.6
0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:1346-1

Security update for containerd

0%
Низкий
2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:1345-1

Security update for containerd

0%
Низкий
2 месяца назад
redos логотип
ROS-20250424-08

Уязвимость containerd

CVSS3: 4.6
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-265r-hfxg-fhmg

containerd has an integer overflow in User ID handling

CVSS3: 4.6
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-05194

Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVSS3: 4.6
0%
Низкий
3 месяца назад

Уязвимостей на страницу