{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64329","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-10-30T17:40:52.028Z","datePublished":"2025-11-07T04:15:09.381Z","dateUpdated":"2025-11-07T17:42:07.929Z"},"containers":{"cna":{"title":"containerd CRI server: Host memory exhaustion through Attach goroutine leak","problemTypes":[{"descriptions":[{"cweId":"CWE-401","lang":"en","description":"CWE-401: Missing Release of Memory after Effective Lifetime","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":6.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2","tags":["x_refsource_CONFIRM"],"url":"https://github.com/containerd/containerd/security/advisories/GHSA-m6hq-p25p-ffr2"},{"name":"https://github.com/containerd/containerd/commit/083b53cd6f19b5de7717b0ce92c11bdf95e612df","tags":["x_refsource_MISC"],"url":"https://github.com/containerd/containerd/commit/083b53cd6f19b5de7717b0ce92c11bdf95e612df"}],"affected":[{"vendor":"containerd","product":"containerd","versions":[{"version":"< 1.7.29","status":"affected"},{"version":"< 2.0.7","status":"affected"},{"version":">= 2.1.0-beta.0, < 2.1.5","status":"affected"},{"version":">= 2.2.0-beta.0, < 2.2.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-11-07T04:15:09.381Z"},"descriptions":[{"lang":"en","value":"containerd is an open-source container runtime. Versions 1.7.28 and below, 2.0.0-beta.0 through 2.0.6, 2.1.0-beta.0 through 2.1.4, and 2.2.0-beta.0 through 2.2.0-rc.1 contain a bug in the CRI Attach implementation where a user can exhaust memory on the host due to goroutine leaks. This issue is fixed in versions 1.7.29, 2.0.7, 2.1.5 and 2.2.0. To workaround this vulnerability, users can set up an admission controller to control accesses to pods/attach resources."}],"source":{"advisory":"GHSA-m6hq-p25p-ffr2","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-07T17:41:50.476907Z","id":"CVE-2025-64329","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-07T17:42:07.929Z"}}]}}