A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1792796 | issue tracking |