CVE-2024-40635Integer Overflow or Wraparound in Containerd

Severity
7.8HIGHNVD
CNA4.6
EPSS
0.0%
top 97.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 17
Latest updateMar 26

Description

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

NVDlinuxfoundation/containerd1.7.01.7.27+2
CVEListV5containerd/containerd< 1.6.38+2
Gogithub.com/containerd_containerd1.7.0-beta.01.7.27+1
Debiancontainerd/containerd< 1.4.13~ds1-1~deb11u5+3

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

5
OSV
containerd has an integer overflow in User ID handling in github.com/containerd/containerd2025-03-18
GHSA
containerd has an integer overflow in User ID handling2025-03-17
OSV
CVE-2024-40635: containerd is an open-source container runtime2025-03-17
OSV
containerd has an integer overflow in User ID handling2025-03-17
CVEList
containerd has an integer overflow in User ID handling2025-03-17

📋Vendor Advisories

4
Ubuntu
containerd vulnerability2025-03-26
Red Hat
containerd: containerd has an integer overflow in User ID handling2025-03-17
Microsoft
containerd has an integer overflow in User ID handling2025-03-11
Debian
CVE-2024-40635: containerd - containerd is an open-source container runtime. A bug was found in containerd pr...2024
CVE-2024-40635 — Integer Overflow or Wraparound | cvebase