Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-60893.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-60893
Upstream
Published
2025-03-17T22:15:13Z
Modified
2026-04-01T05:19:40.671817Z
Summary
CVE-2024-40635 affecting package moby-containerd-cc for versions less than 1.7.7-9
Details

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

References

Affected packages

Azure Linux:3 / moby-containerd-cc

Package

Name
moby-containerd-cc
Purl
pkg:rpm/azure-linux/moby-containerd-cc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.7-9

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-60893.json"