Описание
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | container-tools:1.0/buildah | Fix deferred | ||
Red Hat Enterprise Linux 8 | container-tools:1.0/podman | Fix deferred | ||
Red Hat Enterprise Linux 8 | container-tools:1.0/skopeo | Fix deferred | ||
Red Hat Enterprise Linux 8 | container-tools:2.0/buildah | Affected | ||
Red Hat Enterprise Linux 8 | container-tools:2.0/podman | Affected | ||
Red Hat Enterprise Linux 8 | container-tools:2.0/skopeo | Affected | ||
Red Hat Enterprise Linux 7 Extras | podman | Fixed | RHSA-2020:1227 | 01.04.2020 |
Red Hat Enterprise Linux 7 Extras | docker | Fixed | RHSA-2020:1234 | 01.04.2020 |
Red Hat Enterprise Linux 7 Extras | buildah | Fixed | RHSA-2020:2116 | 12.05.2020 |
Red Hat Enterprise Linux 7 Extras | skopeo | Fixed | RHSA-2020:2681 | 23.06.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.5 Low
CVSS3
Связанные уязвимости
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
Уязвимость пакета podman операционной системы Red Hat Enterprise Linux и корпоративной платформы Red Hat OpenShift Container Platform, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
EPSS
3.5 Low
CVSS3