Moderate severityNVD Advisory· Published May 21, 2025· Updated May 21, 2025
containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.
CVE-2025-47291
Description
containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/containerd/containerd/v2Go | >= 2.0.1, < 2.0.5 | 2.0.5 |
Affected products
1- Range: >= 2.0.1, < 2.0.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-cxfp-7pvr-95ffghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-47291ghsaADVISORY
- github.com/containerd/containerd/security/advisories/GHSA-cxfp-7pvr-95ffghsax_refsource_CONFIRMWEB
- pkg.go.dev/vuln/GO-2025-3701ghsaWEB
News mentions
0No linked articles in our index yet.