Количество 7
Количество 7

CVE-2020-1702
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.

CVE-2020-1702
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
GHSA-f6vj-xx8j-fqmq
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
ELSA-2020-2681
ELSA-2020-2681: skopeo security and bug fix update (LOW)

BDU:2021-03094
Уязвимость пакета podman операционной системы Red Hat Enterprise Linux и корпоративной платформы Red Hat OpenShift Container Platform, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

RLSA-2020:1650
Moderate: container-tools:rhel8 security, bug fix, and enhancement update
ELSA-2020-1650
ELSA-2020-1650: container-tools:ol8 security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-1702 A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0. | CVSS3: 3.5 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2020-1702 A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0. | CVSS3: 3.3 | 0% Низкий | около 4 лет назад |
GHSA-f6vj-xx8j-fqmq A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0. | 0% Низкий | около 3 лет назад | ||
ELSA-2020-2681 ELSA-2020-2681: skopeo security and bug fix update (LOW) | почти 5 лет назад | |||
![]() | BDU:2021-03094 Уязвимость пакета podman операционной системы Red Hat Enterprise Linux и корпоративной платформы Red Hat OpenShift Container Platform, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 3.3 | 0% Низкий | около 4 лет назад |
![]() | RLSA-2020:1650 Moderate: container-tools:rhel8 security, bug fix, and enhancement update | около 5 лет назад | ||
ELSA-2020-1650 ELSA-2020-1650: container-tools:ol8 security, bug fix, and enhancement update (MODERATE) | около 5 лет назад |
Уязвимостей на страницу