MGASA-2025-0130

Source
https://advisories.mageia.org/MGASA-2025-0130.html
Import Source
https://advisories.mageia.org/MGASA-2025-0130.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0130
Related
Published
2025-04-10T00:22:57Z
Modified
2025-04-09T23:48:22Z
Summary
Updated docker-containerd packages fix security vulnerability
Details

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

References
Credits

Affected packages

Mageia:9 / docker-containerd

Package

Name
docker-containerd
Purl
pkg:rpm/mageia/docker-containerd?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.27-1.mga9

Ecosystem specific

{
    "section": "core"
}