UBUNTU-CVE-2025-47291

Source
https://ubuntu.com/security/CVE-2025-47291
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-47291.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-47291
Upstream
Published
2025-05-21T18:15:00Z
Modified
2025-10-10T15:30:15Z
Severity
  • 4.6 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

References

Affected packages

Ubuntu:25.10 / containerd-app

Package

Name
containerd-app
Purl
pkg:deb/ubuntu/containerd-app@2.0.5-0ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.5-0ubuntu1

Affected versions

2.*

2.0.2-0ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2.0.5-0ubuntu1",
            "binary_name": "containerd"
        }
    ]
}

Ubuntu:25.04 / containerd-app

Package

Name
containerd-app
Purl
pkg:deb/ubuntu/containerd-app@2.1.3-0ubuntu3~25.04.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.19-0ubuntu1
1.7.19-0ubuntu2
1.7.19-0ubuntu3

2.*

2.0.0-0ubuntu1
2.0.2-0ubuntu1
2.0.2-0ubuntu2
2.0.5-0ubuntu1~25.04.1
2.1.3-0ubuntu3~25.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.3-0ubuntu3~25.04.1",
            "binary_name": "containerd"
        }
    ]
}