A bug was found in containerd's CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks.
Repetitive calls of CRI Attach (e.g., <code>kubectl attach</code>) could increase the memory usage of containerd.
This bug has been fixed in the following containerd versions:
Users should update to these versions to resolve the issue.
Set up an admission controller to control accesses to pods/attach resources.
e.g., Validating Admission Policy.
The containerd project would like to thank @Wheat2018 for responsibly disclosing this issue in accordance with the containerd security policy.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64329
If you have any questions or comments about this advisory:
To report a security issue in containerd:
{
"github_reviewed_at": "2025-11-06T23:32:23Z",
"nvd_published_at": "2025-11-07T05:16:08Z",
"cwe_ids": [
"CWE-401"
],
"severity": "MODERATE",
"github_reviewed": true
}