Skip to content

Host memory exhaustion through goroutine leaks of Attach functionality in CRI server

Moderate
dmcgowan published GHSA-m6hq-p25p-ffr2 Nov 6, 2025

Package

gomod github.com/containerd/containerd (Go)

Affected versions

< 2.2.0, < 2.1.5, < 2.0.7, < 1.7.29

Patched versions

2.2.0, 2.1.5, 2.0.7, 1.7.29

Description

Impact

A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks.

Repetitive calls of CRI Attach (e.g., kubectl attach) could increase the memory usage of containerd.

Patches

This bug has been fixed in the following containerd versions:

  • 2.2.0
  • 2.1.5
  • 2.0.7
  • 1.7.29

Users should update to these versions to resolve the issue.

Workarounds

Set up an admission controller to control accesses to pods/attach resources.
e.g., Validating Admission Policy.

Credits

The containerd project would like to thank @Wheat2018 for responsibly disclosing this issue in accordance with the containerd security policy.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

Severity

Moderate

CVE ID

CVE-2025-64329

Weaknesses

No CWEs

Credits