A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
| Software | From | Fixed in |
|---|---|---|
| containers-image_project / containers-image | - | 5.2.0 |
| redhat / enterprise_linux | 8.0 | 8.0.x |