A bug was found in the containerd's CRI implementation where containerd doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node.
This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue.
Disable usernamespaced pods in Kubernetes temporarily.
The containerd project would like to thank Rodrigo Campos Catelin and Piotr Rogowski for responsibly disclosing this issue in accordance with the containerd security policy.
If you have any questions or comments about this advisory:
To report a security issue in containerd: * Report a new vulnerability * Email us at security@containerd.io
{ "nvd_published_at": "2025-05-21T18:15:52Z", "cwe_ids": [ "CWE-266" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-05-21T18:01:48Z" }