Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-47291

Опубликовано: 21 мая 2025
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

A vulnerability has been identified in containerd's Container Runtime Interface (CRI) implementation, affecting versions from 2.0.1 up to, but not including, 2.0.5. The flaw lies in the fact that containerd does not correctly place usernamespaced containers within the Kubernetes cgroup hierarchy. As a result, Kubernetes-defined resource limits for these containers are not properly enforced. This issue can lead to uncontrolled resource consumption by affected containers, potentially exhausting the resources of the Kubernetes node and resulting in a denial-of-service condition for the entire node.

Меры по смягчению последствий

This vulnerability has been resolved in containerd versions 2.0.5 and later, as well as 2.1.0 and later. We recommend upgrading all affected containerd installations to these versions to remediate the issue. As a temporary workaround, if immediate upgrade is not feasible, temporarily disable usernamespaced pods within your Kubernetes environment.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Assisted Installer for Red Hat OpenShift Container Platform 2rhai-tech-preview/assisted-installer-agent-rhel8Not affected
Deployment Validation Operatordvo/deployment-validation-operator-bundleNot affected
Deployment Validation Operatordvo/deployment-validation-rhel8-operatorNot affected
Gatekeeper 3gatekeeper/gatekeeper-rhel9Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel9Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-validation-rhel9Not affected
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-agent-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-agent-rhel9Not affected
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-controller-rhel8Not affected
Multicluster Engine for Kubernetesmulticluster-engine/assisted-installer-controller-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-266
https://bugzilla.redhat.com/show_bug.cgi?id=2367852containerd: containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.

EPSS

Процентиль: 3%
0.00018
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

ubuntu
29 дней назад

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

nvd
29 дней назад

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

debian
29 дней назад

containerd is an open-source container runtime. A bug was found in the ...

github
29 дней назад

containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.

EPSS

Процентиль: 3%
0.00018
Низкий

6.3 Medium

CVSS3