5.5 CVE-2025-64329

Patch
 

containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.
https://nvd.nist.gov/vuln/detail/CVE-2025-64329

Categories

CWE-401

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* < 1.7.29
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* >= 2.0.0 < 2.0.7
cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* >= 2.1.0 < 2.1.5
cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta0:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:rc0:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:containerd:2.2.0:rc1:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://github.com/containerd/containerd/commit/083b53cd6f19b5de7717b0ce92c11...
https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry