There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 Aug 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host. |
| Title | cri-o: Large /etc/passwd file may lead to Denial of Service | Cri-o: large /etc/passwd file may lead to denial of service |
| First Time appeared |
Redhat
Redhat openshift |
|
| CPEs | cpe:/a:redhat:openshift:4 | |
| Vendors & Products |
Redhat
Redhat openshift |
|
| References |
|
Fri, 27 Jun 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | cri-o: Large /etc/passwd file may lead to Denial of Service | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-08-20T12:19:18.453Z
Updated: 2025-09-25T02:45:42.640Z
Reserved: 2025-05-08T15:35:44.324Z
Link: CVE-2025-4437
Updated: 2025-08-20T15:15:41.508Z
Status : Awaiting Analysis
Published: 2025-08-20T13:15:28.673
Modified: 2025-08-20T14:39:07.860
Link: CVE-2025-4437