Integer Overflow or Wraparound Affecting docker-debuginfo package, versions <0:25.0.8-1.amzn2023.0.4


Severity

Recommended
0.0
medium
0
10

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-AMZN2023-DOCKERDEBUGINFO-10294151
  • published3 Jun 2025
  • disclosed17 Mar 2025

Introduced: 17 Mar 2025

CVE-2024-40635  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 docker-debuginfo to version 0:25.0.8-1.amzn2023.0.4 or higher.
This issue was patched in ALAS2023-2025-987.

NVD Description

Note: Versions mentioned in the description apply only to the upstream docker-debuginfo package and not the docker-debuginfo package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

containerd is an open-source container runtime. A bug was found in containerd prior to versions 1.6.38, 1.7.27, and 2.0.4 where containers launched with a User set as a UID:GID larger than the maximum 32-bit signed integer can cause an overflow condition where the container ultimately runs as root (UID 0). This could cause unexpected behavior for environments that require containers to run as a non-root user. This bug has been fixed in containerd 1.6.38, 1.7.27, and 2.04. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.

CVSS Base Scores

version 3.1