Количество 10
Количество 10

BDU:2025-05194
Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVE-2024-40635
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVE-2024-40635
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVE-2024-40635
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVE-2024-40635
CVE-2024-40635
containerd is an open-source container runtime. A bug was found in con ...

SUSE-SU-2025:1346-1
Security update for containerd

SUSE-SU-2025:1345-1
Security update for containerd

ROS-20250424-08
Уязвимость containerd
GHSA-265r-hfxg-fhmg
containerd has an integer overflow in User ID handling
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-05194 Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код | CVSS3: 4.6 | 0% Низкий | 3 месяца назад |
![]() | CVE-2024-40635 containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | CVSS3: 4.6 | 0% Низкий | 3 месяца назад |
![]() | CVE-2024-40635 containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | CVSS3: 4.6 | 0% Низкий | 3 месяца назад |
![]() | CVE-2024-40635 containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | CVSS3: 4.6 | 0% Низкий | 3 месяца назад |
![]() | CVSS3: 4.6 | 0% Низкий | около 2 месяцев назад | |
CVE-2024-40635 containerd is an open-source container runtime. A bug was found in con ... | CVSS3: 4.6 | 0% Низкий | 3 месяца назад | |
![]() | SUSE-SU-2025:1346-1 Security update for containerd | 0% Низкий | 2 месяца назад | |
![]() | SUSE-SU-2025:1345-1 Security update for containerd | 0% Низкий | 2 месяца назад | |
![]() | ROS-20250424-08 Уязвимость containerd | CVSS3: 4.6 | 0% Низкий | около 2 месяцев назад |
GHSA-265r-hfxg-fhmg containerd has an integer overflow in User ID handling | CVSS3: 4.6 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу