Integer Overflow or Wraparound Affecting containerd-shim-runc-v2-1 package, versions <1.7.27-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-CONTAINERDSHIMRUNCV21-13324623
  • published6 Oct 2025
  • disclosed17 Mar 2025

Introduced: 17 Mar 2025

CVE-2024-40635  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Minimos:latest containerd-shim-runc-v2-1 to version 1.7.27-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream containerd-shim-runc-v2-1 package and not the containerd-shim-runc-v2-1 package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS Base Scores

version 3.1