Input validation error in containerd - CVE-2026-46680
Published: May 21, 2026
containerd
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass runAsNonRoot restrictions and run a container as root.
The vulnerability exists due to improper input validation in user ID handling when processing a numeric User directive that cannot be parsed as a 32-bit integer. A remote attacker can provide a crafted image with an /etc/passwd file mapping the large numeric string to root to bypass runAsNonRoot restrictions and run a container as root.
The issue occurs when the large numeric User value is incorrectly treated as a username instead of a numeric UID.