A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
[
{
"product": "containers/image",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "containers-image 5.2.0"
}
]
}
]