Логотип exploitDog
bind:CVE-2025-4437
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-4437

Количество 4

Количество 4

redhat логотип

CVE-2025-4437

6 месяцев назад

There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.

CVSS3: 5.7
EPSS: Низкий
nvd логотип

CVE-2025-4437

4 месяца назад

There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.

CVSS3: 5.7
EPSS: Низкий
debian логотип

CVE-2025-4437

4 месяца назад

There's a vulnerability in the CRI-O application where when container ...

CVSS3: 5.7
EPSS: Низкий
github логотип

GHSA-8f93-j3fx-72f3

4 месяца назад

CRI-O has Potential High Memory Consumption from File Read

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-4437

There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.

CVSS3: 5.7
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-4437

There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.

CVSS3: 5.7
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-4437

There's a vulnerability in the CRI-O application where when container ...

CVSS3: 5.7
0%
Низкий
4 месяца назад
github логотип
GHSA-8f93-j3fx-72f3

CRI-O has Potential High Memory Consumption from File Read

CVSS3: 5.7
0%
Низкий
4 месяца назад

Уязвимостей на страницу