Skip to content

chore(deps): update module github.com/containerd/containerd/v2 to v2.0.5 [security] (release-3.5.x) #17796

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 22, 2025

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/containerd/containerd/v2 v2.0.4 -> v2.0.5 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2025-47291

Impact

A bug was found in the containerd's CRI implementation where containerd doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node.

Patches

This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue.

Workarounds

Disable usernamespaced pods in Kubernetes temporarily.

Credits

The containerd project would like to thank Rodrigo Campos Catelin and Piotr Rogowski for responsibly disclosing this issue in accordance with the containerd security policy.

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:


Incorrect cgroup assignment for containers running in usernamespaced Kubernetes pods in github.com/containerd/containerd

CVE-2025-47291 / GHSA-cxfp-7pvr-95ff / GO-2025-3701

More information

Details

Incorrect cgroup assignment for containers running in usernamespaced Kubernetes pods in github.com/containerd/containerd

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.

CVE-2025-47291 / GHSA-cxfp-7pvr-95ff / GO-2025-3701

More information

Details

Impact

A bug was found in the containerd's CRI implementation where containerd doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node.

Patches

This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue.

Workarounds

Disable usernamespaced pods in Kubernetes temporarily.

Credits

The containerd project would like to thank Rodrigo Campos Catelin and Piotr Rogowski for responsibly disclosing this issue in accordance with the containerd security policy.

For more information

If you have any questions or comments about this advisory:

To report a security issue in containerd:

Severity

  • CVSS Score: Unknown
  • Vector String: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

containerd/containerd (github.com/containerd/containerd/v2)

v2.0.5: containerd 2.0.5

Compare Source

Welcome to the v2.0.5 release of containerd!

The fifth patch release for containerd 2.0 includes various bug fixes and updates.

Highlights
Build and Release Toolchain
Container Runtime Interface (CRI)
  • Update ImageService to delete images synchronously (#​11599)
Image Distribution
  • Prevent panic on zero length push (#​11698)
  • Set default differ for the default unpack config of transfer service (#​11688)
Runtime
  • Remove invalid error log when stopping container after containerd restart (#​11621)
  • Update taskOptions based on runtimeOptions when creating a task (#​11618)

Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.

Contributors
  • Akihiro Suda
  • Akhil Mohan
  • Derek McGowan
  • Phil Estes
  • Wei Fu
  • Iceber Gu
  • Austin Vazquez
  • Maksym Pavlenko
  • Cesar Talledo
  • Henry Wang
  • Jin Dong
  • Krisztian Litkey
  • Yang Yang
Changes
33 commits

  • Update go to 1.23.8 (#​11717)
  • Prepare release notes for v2.0.5 (#​11713)
  • Disable criu test on arm64 (#​11710)
    • 58b715ad8 Disable arm64 criu testing in GH Actions
    • b4a53e826 disable portmap test in ubuntu-22 to make CI happy
    • 4bcf472de add option to skip tests in critest
  • Prevent panic on zero length push (#​11698)
  • Set default differ for the default unpack config of transfer service (#​11688)
    • 84d9658c3 Set default differ for the default unpack config of transfer service
  • ci: update GitHub Actions release runner to ubuntu-24.04 (#​11703)
    • b184a97d3 ci: update GitHub Actions release runner to ubuntu-24.04
  • Remove invalid error log when stopping container after containerd restart (#​11621)
  • Update taskOptions based on runtimeOptions when creating a task (#​11618)
    • 9f46e7a44 integration/client: add tests for TaskOptions is not empty
    • 8a16a6a04 prefer task options for PluginInfo request
    • a183b2d23 update taskOptions based on runtimeOptions when creating a task
  • Update ImageService to delete images synchronously (#​11599)
    • 091143135 *: CRIImageService should delete image synchronously
  • Update runc binary to v1.2.6 (#​11583)
  • go.{mod,sum}: bump CDI deps to stable v1.0.0. (#​11566)
    • e8506511b go.{mod,sum}: bump CDI deps to stable v1.0.0.
  • silence govulncheck false positives (#​11571)
    • 4cfb89430 go.mod: github.com/go-jose/go-jose/v4
    • 2b9e6a29d go.mod: golang.org/x/oauth2 v0.28.0
    • 6df1ea0d9 go.mod: golang.org/x/net v0.37.0
  • Fix CI lint error (cherry-picked #​11555) (#​11567)

Dependency Changes
  • github.com/go-jose/go-jose/v4 v4.0.4 -> v4.0.5
  • golang.org/x/crypto v0.31.0 -> v0.36.0
  • golang.org/x/net v0.33.0 -> v0.37.0
  • golang.org/x/oauth2 v0.23.0 -> v0.28.0
  • golang.org/x/sync v0.10.0 -> v0.12.0
  • golang.org/x/sys v0.28.0 -> v0.31.0
  • golang.org/x/term v0.27.0 -> v0.30.0
  • golang.org/x/text v0.21.0 -> v0.23.0
  • tags.cncf.io/container-device-interface v0.8.1 -> v1.0.0
  • tags.cncf.io/container-device-interface/specs-go v0.8.0 -> v1.0.0

Previous release can be found at v2.0.4

Which file should I download?
  • containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.31 (Ubuntu 20.04).
  • containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on non-glibc Linux distributions. Not position-independent.

In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.

See also the Getting Started documentation.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner May 22, 2025 13:55
@renovate renovate bot added area/security dependencies Pull requests that update a dependency file labels May 22, 2025
@renovate renovate bot changed the title chore(deps): update module github.com/containerd/containerd/v2 to v2.0.5 [security] (release-3.5.x) chore(deps): update module github.com/containerd/containerd/v2 to v2.0.5 [security] (release-3.5.x) - autoclosed May 24, 2025
@renovate renovate bot closed this May 24, 2025
@renovate renovate bot deleted the deps-update/release-3.5.x-go-github.com-containerd-containerd-v2-vulnerability branch May 24, 2025 13:05
@renovate renovate bot changed the title chore(deps): update module github.com/containerd/containerd/v2 to v2.0.5 [security] (release-3.5.x) - autoclosed chore(deps): update module github.com/containerd/containerd/v2 to v2.0.5 [security] (release-3.5.x) May 24, 2025
@renovate renovate bot reopened this May 24, 2025
@renovate renovate bot force-pushed the deps-update/release-3.5.x-go-github.com-containerd-containerd-v2-vulnerability branch from 6195790 to 3270536 Compare May 24, 2025 16:40
@paul1r paul1r merged commit 695b31a into release-3.5.x May 29, 2025
136 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security dependencies Pull requests that update a dependency file size/XS
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant