5.5 CVE-2025-64329
containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.
https://nvd.nist.gov/vuln/detail/CVE-2025-64329
Categories
CWE-401
References
security-advisories@github.com Patch
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* |
|
< 1.7.29 |
| cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* |
>= 2.0.0 |
< 2.0.7 |
| cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* |
>= 2.1.0 |
< 2.1.5 |
| cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta0:*:*:*:*:*:* |
|
|
| cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta1:*:*:*:*:*:* |
|
|
| cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta2:*:*:*:*:*:* |
|
|
| cpe:2.3:a:linuxfoundation:containerd:2.2.0:rc0:*:*:*:*:*:* |
|
|
| cpe:2.3:a:linuxfoundation:containerd:2.2.0:rc1:*:*:*:*:*:* |
|
|
REMEDIATION
Patch
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer