Описание
containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
A vulnerability has been identified in containerd's Container Runtime Interface (CRI) implementation, affecting versions from 2.0.1 up to, but not including, 2.0.5. The flaw lies in the fact that containerd does not correctly place usernamespaced containers within the Kubernetes cgroup hierarchy. As a result, Kubernetes-defined resource limits for these containers are not properly enforced. This issue can lead to uncontrolled resource consumption by affected containers, potentially exhausting the resources of the Kubernetes node and resulting in a denial-of-service condition for the entire node.
Меры по смягчению последствий
This vulnerability has been resolved in containerd versions 2.0.5 and later, as well as 2.1.0 and later. We recommend upgrading all affected containerd installations to these versions to remediate the issue. As a temporary workaround, if immediate upgrade is not feasible, temporarily disable usernamespaced pods within your Kubernetes environment.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Assisted Installer for Red Hat OpenShift Container Platform 2 | rhai-tech-preview/assisted-installer-agent-rhel8 | Not affected | ||
Deployment Validation Operator | dvo/deployment-validation-operator-bundle | Not affected | ||
Deployment Validation Operator | dvo/deployment-validation-rhel8-operator | Not affected | ||
Gatekeeper 3 | gatekeeper/gatekeeper-rhel9 | Not affected | ||
Logging Subsystem for Red Hat OpenShift | openshift-logging/logging-loki-rhel9 | Not affected | ||
Migration Toolkit for Virtualization | migration-toolkit-virtualization/mtv-validation-rhel9 | Not affected | ||
Multicluster Engine for Kubernetes | multicluster-engine/assisted-installer-agent-rhel8 | Not affected | ||
Multicluster Engine for Kubernetes | multicluster-engine/assisted-installer-agent-rhel9 | Not affected | ||
Multicluster Engine for Kubernetes | multicluster-engine/assisted-installer-controller-rhel8 | Not affected | ||
Multicluster Engine for Kubernetes | multicluster-engine/assisted-installer-controller-rhel9 | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
6.3 Medium
CVSS3
Связанные уязвимости
containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
containerd is an open-source container runtime. A bug was found in the ...
containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.
EPSS
6.3 Medium
CVSS3