Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-58844.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-58844
Upstream
Published
2025-03-17T22:15:13Z
Modified
2026-04-01T05:19:22.055745Z
Summary
CVE-2024-40635 affecting package moby-containerd for versions less than 1.6.26-11
Details

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

References

Affected packages

Azure Linux:2 / moby-containerd

Package

Name
moby-containerd
Purl
pkg:rpm/azure-linux/moby-containerd

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.26-11

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-58844.json"