Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4437: Allocation of Resources Without Limits or Throttling in Red Hat Red Hat OpenShift Container Platform 4

0
Medium
VulnerabilityCVE-2025-4437cvecve-2025-4437
Published: Wed Aug 20 2025 (08/20/2025, 12:19:18 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat OpenShift Container Platform 4

Description

There's a vulnerability in the CRI-O application where when container is launched with securityContext.runAsUser specifying a non-existent user, CRI-O attempts to create the user, reading the container's entire /etc/passwd file into memory. If this file is excessively large, it can cause the a high memory consumption leading applications to be killed due to out-of-memory. As a result a denial-of-service can be achieved, possibly disrupting other pods and services running in the same host.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:33:19 UTC

Technical Analysis

CVE-2025-4437 is a vulnerability identified in the CRI-O container runtime component used by Red Hat OpenShift Container Platform 4. The issue arises when a container is launched with the securityContext.runAsUser field specifying a user ID that does not exist inside the container's user database. In response, CRI-O attempts to create the user by reading the container's entire /etc/passwd file into memory. If this file is unusually large, this operation can cause excessive memory consumption on the host system. Such memory exhaustion can lead to out-of-memory (OOM) conditions, causing the kernel or container runtime to kill processes, including critical applications and other pods running on the same host node. This results in a denial-of-service (DoS) condition affecting availability. The vulnerability requires that an attacker have privileges to launch containers with specific user contexts and some user interaction to trigger the condition. The CVSS 3.1 base score is 5.7, reflecting medium severity with network attack vector, low attack complexity, privileges required, and user interaction needed. There is no impact on confidentiality or integrity, only availability. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a resource allocation flaw where limits or throttling are not enforced when reading large user database files during container startup. This can be exploited to disrupt workloads in multi-tenant or shared cluster environments. Mitigation will likely involve vendor patches to limit memory usage or validate /etc/passwd file size, as well as operational controls to prevent excessively large passwd files inside containers.

Potential Impact

The primary impact of CVE-2025-4437 is denial-of-service through resource exhaustion on hosts running Red Hat OpenShift Container Platform 4 with CRI-O. Excessive memory consumption can cause the kernel or container runtime to kill processes, disrupting not only the targeted container but also other pods and services sharing the same node. This can degrade cluster availability and reliability, potentially affecting critical workloads and business operations. In multi-tenant environments, an attacker with container launch privileges could intentionally trigger this condition to disrupt other tenants. While confidentiality and integrity are not affected, the availability impact can be significant, especially in production environments with high workload density. The requirement for privileges and user interaction limits the attack surface but does not eliminate risk in environments where users can deploy containers with custom security contexts. Organizations relying on OpenShift 4 for container orchestration should consider this vulnerability a moderate operational risk that could lead to service outages and increased operational overhead for remediation and recovery.

Mitigation Recommendations

To mitigate CVE-2025-4437, organizations should take the following specific actions: 1) Monitor and audit container images and runtime environments to ensure /etc/passwd files are of reasonable size and do not contain excessive entries that could trigger high memory usage. 2) Implement strict admission controls and policies to restrict the ability of users to launch containers with arbitrary or non-existent runAsUser values, limiting privilege escalation or misuse. 3) Apply any vendor-provided patches or updates from Red Hat addressing this vulnerability as soon as they become available. 4) Use resource quotas and limits at the Kubernetes/OpenShift level to constrain memory usage per pod and node, reducing the impact of memory exhaustion events. 5) Employ runtime monitoring and alerting to detect unusual memory consumption patterns on nodes hosting OpenShift workloads. 6) Consider isolating critical workloads on dedicated nodes to minimize collateral impact from DoS caused by other containers. 7) Educate developers and operators about the risks of specifying non-existent users in security contexts and enforce best practices for container user management. These measures combined will reduce the likelihood and impact of exploitation beyond generic advice.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-08T15:35:44.324Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a5c06fad5a09ad0004bfed

Added to database: 8/20/2025, 12:32:47 PM

Last enriched: 2/27/2026, 2:33:19 PM

Last updated: 3/25/2026, 2:44:53 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses