Github.Com Cri-O Cri-O vulnerabilities

12 known vulnerabilities affecting github.com/cri-o_cri-o.

Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM7

Vulnerabilities

Page 1 of 1
CVE-2025-4437MEDIUM≥ 0, ≤ 1.33.32025-08-20
CVE-2025-4437 [MEDIUM] CWE-770 CRI-O has Potential High Memory Consumption from File Read CRI-O has Potential High Memory Consumption from File Read There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be kill
ghsaosv
CVE-2025-0750MEDIUM≥ 0, ≤ 1.33.02025-01-28
CVE-2025-0750 [MEDIUM] CWE-22 CRI-O Path Traversal vulnerability CRI-O Path Traversal vulnerability A vulnerability was found in CRI-O. A path traversal issue in the log management functions (UnMountPodLogs and LinkContainerLogs) may allow an attacker with permissions to create and delete Pods to unmount arbitrary host paths, leading to node-level denial of service by unmounting critical system directories.
ghsaosv
CVE-2024-8676MEDIUM≥ 0, < 1.29.11≥ 1.30.0, < 1.30.8+1 more2024-11-26
CVE-2024-8676 [MEDIUM] CWE-285 CRI-O: Maliciously structured checkpoint file can gain arbitrary node access CRI-O: Maliciously structured checkpoint file can gain arbitrary node access ### Impact ### Patches 1.31.1, 1.30.6, 1.29.8 ### Workarounds set `enable_criu_support = false` ### References _Are there any links users can visit to find out more?_
ghsaosv
CVE-2024-5154HIGH≥ 1.28.6, < 1.28.7≥ 1.29.4, < 1.29.5+1 more2024-06-04
CVE-2024-5154 [HIGH] CWE-22 malicious container creates symlink "mtab" on the host External malicious container creates symlink "mtab" on the host External ### Impact A malicious container can affect the host by taking advantage of code cri-o added to show the container mounts on the host. A workload built from this Dockerfile: ``` FROM docker.io/library/busybox as source RUN mkdir /extra && cd /extra && ln -s ../../../../../../../../root etc FROM scratch COPY --from=source /bin /bin COPY --
ghsaosv
CVE-2024-3154HIGH≥ 1.29.0, < 1.29.4≥ 1.28.0, < 1.28.6+1 more2024-04-30
CVE-2024-3154 [HIGH] CWE-77 CRI-O vulnerable to an arbitrary systemd property injection CRI-O vulnerable to an arbitrary systemd property injection ### Impact On CRI-O, it looks like an arbitrary systemd property can be injected via a Pod annotation: ``` --- apiVersion: v1 kind: Pod metadata: name: poc-arbitrary-systemd-property-injection annotations: # I believe that ExecStart with an arbitrary command works here too, # but I haven't figured out how to marshalize the ExecStart struct to gvaria
ghsaosv
CVE-2023-6476MEDIUM≥ 1.29.0, < 1.29.1≥ 1.28.0, < 1.28.3+1 more2024-01-10
CVE-2023-6476 [MEDIUM] CWE-400 CRI-O's pods can break out of resource confinement on cgroupv2 CRI-O's pods can break out of resource confinement on cgroupv2 ### Impact _What kind of vulnerability is it? Who is impacted?_ All versions of CRI-O running on cgroupv2 nodes. Unchecked access to an experimental annotation allows a container to be unconfined. Back in 2021, [support was added](https://github.com/cri-o/cri-o/pull/4479) to support an experimental annotation that allows a user to request s
ghsaosv
CVE-2022-4318MEDIUM≥ 0, < 1.26.02022-12-29
CVE-2022-4318 [MEDIUM] CWE-538 CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation ### Impact It is possible to craft an environment variable with newlines to add entries to a container's /etc/passwd. It is possible to circumvent admission validation of username/UID by adding such an entry. Note: because the pod author is in control of the container's /etc/passwd, this is not considered a new ri
ghsaosv
CVE-2022-2995HIGH≥ 0, < 1.25.02022-09-20
CVE-2022-2995 [HIGH] CWE-284 CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is
ghsaosv
CVE-2022-1708HIGH≥ 1.24.0, < 1.24.1≥ 1.23.0, < 1.23.3+1 more2022-06-06
CVE-2022-1708 [HIGH] CWE-400 Node DOS by way of memory exhaustion through ExecSync request in CRI-O Node DOS by way of memory exhaustion through ExecSync request in CRI-O ### Description An ExecSync request runs a command in a container and returns the output to the Kubelet. It is used for readiness and liveness probes within a pod. The way CRI-O runs ExecSync commands is through conmon. CRI-O asks conmon to start the process, and conmon writes the output to disk. CRI-O then reads the output an
ghsaosv
CVE-2022-27652MEDIUM≥ 0, < 1.24.02022-04-22
CVE-2022-27652 [MEDIUM] CWE-276 Incorrect Default Permissions in CRI-O Incorrect Default Permissions in CRI-O ### Impact A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise
ghsaosv
CVE-2022-0811HIGH≥ 1.19.0, < 1.19.6≥ 1.20.0, < 1.20.7+3 more2022-03-15
CVE-2022-0811 [HIGH] CWE-94 Code Injection in CRI-O Code Injection in CRI-O ### Impact A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve container escape and arbitrary code execution as root on any node in the cluster. ### Patches The patches w
ghsaosv
CVE-2022-0532MEDIUM≥ 0, < 1.23.12022-02-11
CVE-2022-0532 [MEDIUM] CWE-732 Incorrect Permission Assignment for Critical Resource in CRI-O Incorrect Permission Assignment for Critical Resource in CRI-O An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
ghsaosv