CVE-2025-64329

Source
https://cve.org/CVERecord?id=CVE-2025-64329
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64329.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-64329
Aliases
Downstream
Related
Published
2025-11-07T04:15:09.381Z
Modified
2026-05-16T11:52:54.201656257Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
containerd CRI server: Host memory exhaustion through Attach goroutine leak
Details

containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources.

Database specific
{
    "cwe_ids": [
        "CWE-401"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64329.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages