A bug was found in containerd where containers launched with a User set as a UID:GID
larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user.
This bug has been fixed in the following containerd versions:
Users should update to these versions to resolve the issue.
Ensure that only trusted images are used and that only trusted users have permissions to import images.
The containerd project would like to thank Benjamin Koltermann and emxll for responsibly disclosing this issue in accordance with the containerd security policy.
If you have any questions or comments about this advisory:
To report a security issue in containerd: * Report a new vulnerability * Email us at security@containerd.io
{ "nvd_published_at": "2025-03-17T22:15:13Z", "cwe_ids": [ "CWE-190" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-03-17T21:24:42Z" }