CVE-2025-64329

NameCVE-2025-64329
Descriptioncontainerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4467-1
Debian Bugs1120343

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
containerd (PTS)bullseye1.4.13~ds1-1~deb11u4vulnerable
bullseye (security)1.4.13~ds1-1~deb11u6fixed
bookworm, bookworm (security)1.6.20~ds1-1+deb12u2vulnerable
trixie (security), trixie1.7.24~ds1-6+deb13u1fixed
forky, sid1.7.24~ds1-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
containerdsourcebullseye1.4.13~ds1-1~deb11u6DLA-4467-1
containerdsourcetrixie1.7.24~ds1-6+deb13u1
containerdsource(unstable)1.7.24~ds1-101120343

Notes

[bookworm] - containerd <no-dsa> (Minor issue)
https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2
https://github.com/containerd/containerd/commit/a0d0f0ef68935338d2c710db164fa7820f692530 (v2.2.0)
https://github.com/containerd/containerd/commit/c575d1b5f4011f33b32f71ace75367a92b08c750 (v1.7.29)

Search for package or bug name: Reporting problems