![]() This flaw affects containers-image versions before 5.2.0. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |