Resource Exhaustion Vulnerability in CRI-O from Red Hat
CVE-2022-1708

7.5HIGH

Key Information:

Vendor
Kubernetes
Status
Vendor
CVE Published:
7 June 2022

Summary

A crucial issue in CRI-O allows users with access to the Kube API to exploit ExecSync requests, leading to potential memory or disk space exhaustion on the node. When commands are executed within a container, their outputs can become excessively large, causing CRI-O to consume significant system resources when reading this data. This vulnerability places system availability at risk, making it imperative for organizations to apply the necessary updates to protect their infrastructure.

Affected Version(s)

CRI-O Affects cri-o <= 1.24.0, 1.23.2, 1.22.4, Fixed-in 1.24.1, 1.23.3, 1.22.5

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.