Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m6hq-p25p-ffr2

Опубликовано: 06 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.9

Описание

containerd CRI server: Host memory exhaustion through Attach goroutine leak

Impact

A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks.

Repetitive calls of CRI Attach (e.g., kubectl attach) could increase the memory usage of containerd.

Patches

This bug has been fixed in the following containerd versions:

  • 2.2.0
  • 2.1.5
  • 2.0.7
  • 1.7.29

Users should update to these versions to resolve the issue.

Workarounds

Set up an admission controller to control accesses to pods/attach resources. e.g., Validating Admission Policy.

Credits

The containerd project would like to thank @Wheat2018 for responsibly disclosing this issue in accordance with the containerd security policy.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

Пакеты

Наименование

github.com/containerd/containerd

go
Затронутые версииВерсия исправления

< 1.7.29

1.7.29

Наименование

github.com/containerd/containerd/v2

go
Затронутые версииВерсия исправления

< 2.0.7

2.0.7

Наименование

github.com/containerd/containerd/v2

go
Затронутые версииВерсия исправления

>= 2.1.0-beta.0, < 2.1.5

2.1.5

Наименование

github.com/containerd/containerd/v2

go
Затронутые версииВерсия исправления

>= 2.2.0-beta.0, < 2.2.0

2.2.0

EPSS

Процентиль: 4%
0.00019
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-401

Связанные уязвимости

CVSS3: 5.5
ubuntu
2 месяца назад

containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.

CVSS3: 5.5
nvd
2 месяца назад

containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.

msrc
2 месяца назад

containerd CRI server: Host memory exhaustion through Attach goroutine leak

CVSS3: 5.5
debian
2 месяца назад

containerd is an open-source container runtime. Versions 1.7.28 and be ...

CVSS3: 6.2
fstec
2 месяца назад

Уязвимость среды выполнения контейнеров containerd, связанная с отсутствием освобождения памяти после эффективного срока службы, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 4%
0.00019
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-401