First published: Mon Mar 17 2025(Updated: )
### Impact A bug was found in containerd where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. ### Patches This bug has been fixed in the following containerd versions: * 2.0.4 (Fixed in https://github.com/containerd/containerd/commit/1a43cb6a1035441f9aca8f5666a9b3ef9e70ab20) * 1.7.27 (Fixed in https://github.com/containerd/containerd/commit/05044ec0a9a75232cad458027ca83437aae3f4da) * 1.6.38 (Fixed in https://github.com/containerd/containerd/commit/cf158e884cfe4812a6c371b59e4ea9bc4c46e51a) Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images are used and that only trusted users have permissions to import images. ### Credits The containerd project would like to thank [Benjamin Koltermann](https://github.com/p4ck3t0) and [emxll](https://github.com/emxll) for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md). ### References * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40635 ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/containerd/containerd | <1.6.38 | 1.6.38 |
go/github.com/containerd/containerd | >=1.7.0-beta.0<1.7.27 | 1.7.27 |
go/github.com/containerd/containerd/v2 | <2.0.4 | 2.0.4 |
debian/containerd | <=1.4.13~ds1-1~deb11u4<=1.4.13~ds1-1~deb11u2<=1.6.20~ds1-1+deb12u1<=1.7.24~ds1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40635 is considered to have a critical severity as it allows containers to run as root, potentially compromising the host system.
To fix CVE-2024-40635, upgrade containerd to version 1.6.38, 1.7.27, or 2.0.4 or later, depending on your installation.
CVE-2024-40635 affects containerd versions prior to 1.6.38, 1.7.0-beta.0 to 1.7.27, and below 2.0.4.
CVE-2024-40635 is caused by a bug where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer lead to an overflow condition.
CVE-2024-40635 can result in unexpected behavior, including containers running with elevated privileges as root, which poses security risks.