Incorrect Privilege Assignment Affecting containerd-2 package, versions <2.0.5-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Privilege Assignment vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-CONTAINERD2-13326339
  • published6 Oct 2025
  • disclosed21 May 2025

Introduced: 21 May 2025

CVE-2025-47291  (opens in a new tab)
CWE-266  (opens in a new tab)

How to fix?

Upgrade Minimos:latest containerd-2 to version 2.0.5-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream containerd-2 package and not the containerd-2 package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.

CVSS Base Scores

version 3.1