Select your cookie preferences

We use cookies and similar tools to enhance your experience, provide our services, deliver relevant advertising, and make improvements. Approved third parties also use these tools to help us deliver advertising and provide certain site features.

CVE-2024-40635

Public on 2025-03-17
Modified on 2025-05-12
Description

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a `UID:GID` larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

Severity
Medium
See what this means
CVSS v3 Base Score
4.6
See breakdown
Continue reading

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 2 - Docker Extra containerd 2025-04-01 ALAS2DOCKER-2025-054
Amazon Linux 2 - Ecs Extra containerd 2025-04-29 ALAS2ECS-2025-056
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra containerd 2025-04-01 ALAS2NITRO-ENCLAVES-2025-051
Amazon Linux 2023 containerd 2025-04-01 ALAS2023-2025-920
Amazon Linux 2 - Docker Extra docker 2025-05-29 ALAS2DOCKER-2025-066
Amazon Linux 2 - Ecs Extra docker 2025-06-11 ALAS2ECS-2025-066
Amazon Linux 2 - Aws-nitro-enclaves-cli Extra docker 2025-05-29 ALAS2NITRO-ENCLAVES-2025-062
Amazon Linux 2023 docker 2025-06-02 ALAS2023-2025-987
Amazon Linux 2 - Ecs Extra ecs-init 2025-06-11 ALAS2ECS-2025-067
Amazon Linux 2023 ecs-init 2025-06-10 ALAS2023-2025-1015

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
NVD CVSSv3 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N