containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
References
Link | Resource |
---|---|
https://github.com/containerd/containerd/security/advisories/GHSA-cxfp-7pvr-95ff | Vendor Advisory |
Configurations
History
19 Sep 2025, 17:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:* | |
First Time |
Linuxfoundation
Linuxfoundation containerd |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/containerd/containerd/security/advisories/GHSA-cxfp-7pvr-95ff - Vendor Advisory | |
Summary |
|
21 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 18:15
Updated : 2025-09-19 17:25
NVD link : CVE-2025-47291
Mitre link : CVE-2025-47291
CVE.ORG link : CVE-2025-47291
JSON object : View
Products Affected
linuxfoundation
- containerd
CWE
CWE-266
Incorrect Privilege Assignment