Resource Exhaustion Vulnerability in CRI-O from Red Hat
CVE-2022-1708
7.5HIGH
Summary
A crucial issue in CRI-O allows users with access to the Kube API to exploit ExecSync requests, leading to potential memory or disk space exhaustion on the node. When commands are executed within a container, their outputs can become excessively large, causing CRI-O to consume significant system resources when reading this data. This vulnerability places system availability at risk, making it imperative for organizations to apply the necessary updates to protect their infrastructure.
Affected Version(s)
CRI-O Affects cri-o <= 1.24.0, 1.23.2, 1.22.4, Fixed-in 1.24.1, 1.23.3, 1.22.5
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved