There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host. |
Title | cri-o: Large /etc/passwd file may lead to Denial of Service | Cri-o: large /etc/passwd file may lead to denial of service |
First Time appeared |
Redhat
Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 | |
Vendors & Products |
Redhat
Redhat openshift |
|
References |
|
Fri, 27 Jun 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | cri-o: Large /etc/passwd file may lead to Denial of Service | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-08-20T12:19:18.453Z
Updated: 2025-08-20T15:15:46.773Z
Reserved: 2025-05-08T15:35:44.324Z
Link: CVE-2025-4437

Updated: 2025-08-20T15:15:41.508Z

Status : Awaiting Analysis
Published: 2025-08-20T13:15:28.673
Modified: 2025-08-20T14:39:07.860
Link: CVE-2025-4437
