Vulnerabilities (CVE)

Filtered by vendor Containers-image Project Subscribe
Total 1 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-1702 2 Containers-image Project, Redhat 2 Containers-image, Enterprise Linux 2024-11-21 4.3 MEDIUM 3.3 LOW
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.