#VU105799 Integer overflow in containerd - CVE-2024-40635


Vulnerability identifier: #VU105799

Vulnerability risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40635

CWE-ID: CWE-190

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
containerd
Other software / Other software solutions

Vendor: containerd

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow when handling a UID:GID larger than the maximum 32-bit signed integer. A local user can pass a large user identifier value to the application, trigger an integer overflow and execute arbitrary code on the target system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

containerd: 1.6.0 - 1.6.37, 1.7.0 - 1.7.26, 2.0.0 - 2.0.3


External links
https://github.com/containerd/containerd/security/advisories/GHSA-265r-hfxg-fhmg
https://github.com/containerd/containerd/commit/1a43cb6a1035441f9aca8f5666a9b3ef9e70ab20
https://github.com/containerd/containerd/commit/05044ec0a9a75232cad458027ca83437aae3f4da
https://github.com/containerd/containerd/commit/cf158e884cfe4812a6c371b59e4ea9bc4c46e51a


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability