Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-47291

Опубликовано: 21 мая 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

РелизСтатусПримечание
devel

not-affected

2.0.1+ only
esm-apps/bionic

not-affected

2.0.1+ only
esm-apps/noble

not-affected

2.0.1+ only
esm-apps/xenial

not-affected

2.0.1+ only
esm-infra/focal

not-affected

2.0.1+ only
focal

ignored

end of standard support, was needs-triage
jammy

not-affected

2.0.1+ only
noble

not-affected

2.0.1+ only
oracular

ignored

end of life, was needs-triage
plucky

not-affected

2.0.1+ only

Показывать по

РелизСтатусПримечание
devel

released

2.0.5-0ubuntu1
esm-apps/focal

not-affected

2.0.1+ only
esm-apps/jammy

not-affected

2.0.1+ only
focal

ignored

end of standard support, was needs-triage
jammy

not-affected

2.0.1+ only
noble

not-affected

2.0.1+ only
oracular

ignored

end of life, was needs-triage
plucky

needed

upstream

released

2.0.5

Показывать по

EPSS

Процентиль: 4%
0.00021
Низкий

Связанные уязвимости

CVSS3: 6.3
redhat
3 месяца назад

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

nvd
3 месяца назад

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

msrc
около 1 месяца назад

Описание отсутствует

debian
3 месяца назад

containerd is an open-source container runtime. A bug was found in the ...

github
3 месяца назад

containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.

EPSS

Процентиль: 4%
0.00021
Низкий
Уязвимость CVE-2025-47291