Lucene search

K
redhatcveRedhat.comRH:CVE-2019-14891
HistoryNov 19, 2019 - 11:07 p.m.

CVE-2019-14891

2019-11-1923:07:31
redhat.com
access.redhat.com
13

EPSS

0.001

Percentile

31.4%

A flaw was found in cri-o, as a result of all pod-related processes being placed in the same memory cgroup. This can result in container management (conmon) processes being killed if a workload process triggers an out-of-memory (OOM) condition for the cgroup. An attacker could abuse this flaw to get host network access on an cri-o host.

Mitigation

As of cri-o v1.15 you can set conmon_cgroup = "system.slice" in the crio.runtime section of /etc/crio/crio.conf. On OpenShift Container Platform 4.x that can be done by following the documentation here:
<https://access.redhat.com/documentation/en-us/openshift_container_platform/4.2/html/architecture/architecture-rhcos&gt;

For OpenShift Container Platform 3.x you can edit /etc/crio/crio.conf directly on the worker node if using cri-o on that version. Cri-o is not the default container engine on that version, Docker is.

EPSS

0.001

Percentile

31.4%