CRI-O has Potential High Memory Consumption from File Read
Moderate severity
GitHub Reviewed
Published
Aug 20, 2025
to the GitHub Advisory Database
•
Updated Aug 29, 2025
Description
Published by the National Vulnerability Database
Aug 20, 2025
Published to the GitHub Advisory Database
Aug 20, 2025
Reviewed
Aug 20, 2025
Last updated
Aug 29, 2025
There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.
References