Количество 10
Количество 10
CVE-2024-40635
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
CVE-2024-40635
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
CVE-2024-40635
containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
CVE-2024-40635
CVE-2024-40635
containerd is an open-source container runtime. A bug was found in con ...
SUSE-SU-2025:1346-1
Security update for containerd
SUSE-SU-2025:1345-1
Security update for containerd
GHSA-265r-hfxg-fhmg
containerd has an integer overflow in User ID handling
BDU:2025-05194
Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
ROS-20250424-08
Уязвимость containerd
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-40635 containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | CVSS3: 4.6 | 0% Низкий | 10 месяцев назад | |
CVE-2024-40635 containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | CVSS3: 4.6 | 0% Низкий | 10 месяцев назад | |
CVE-2024-40635 containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | CVSS3: 4.6 | 0% Низкий | 10 месяцев назад | |
CVSS3: 4.6 | 0% Низкий | 9 месяцев назад | ||
CVE-2024-40635 containerd is an open-source container runtime. A bug was found in con ... | CVSS3: 4.6 | 0% Низкий | 10 месяцев назад | |
SUSE-SU-2025:1346-1 Security update for containerd | 0% Низкий | 9 месяцев назад | ||
SUSE-SU-2025:1345-1 Security update for containerd | 0% Низкий | 9 месяцев назад | ||
GHSA-265r-hfxg-fhmg containerd has an integer overflow in User ID handling | CVSS3: 4.6 | 0% Низкий | 10 месяцев назад | |
BDU:2025-05194 Уязвимость среды выполнения контейнеров containerd, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код | CVSS3: 4.6 | 0% Низкий | 10 месяцев назад | |
ROS-20250424-08 Уязвимость containerd | CVSS3: 4.6 | 0% Низкий | 9 месяцев назад |
Уязвимостей на страницу