Vulnerability Details CVE-2020-1702
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 49.8%
CVSS Severity
CVSS v3 Score 3.3
CVSS v2 Score 4.3
Products affected by CVE-2020-1702
-
cpe:2.3:a:containers-image_project:containers-image:-
-
cpe:2.3:a:containers-image_project:containers-image:1.0
-
cpe:2.3:a:containers-image_project:containers-image:1.1
-
cpe:2.3:a:containers-image_project:containers-image:1.2
-
cpe:2.3:a:containers-image_project:containers-image:1.3
-
cpe:2.3:a:containers-image_project:containers-image:1.4
-
cpe:2.3:a:containers-image_project:containers-image:1.5
-
cpe:2.3:a:containers-image_project:containers-image:1.5.1
-
cpe:2.3:a:containers-image_project:containers-image:2.0.0
-
cpe:2.3:a:containers-image_project:containers-image:2.0.1
-
cpe:2.3:a:containers-image_project:containers-image:3.0.0
-
cpe:2.3:a:containers-image_project:containers-image:3.0.1
-
cpe:2.3:a:containers-image_project:containers-image:3.0.2
-
cpe:2.3:a:containers-image_project:containers-image:4.0.0
-
cpe:2.3:a:containers-image_project:containers-image:4.0.1
-
cpe:2.3:a:containers-image_project:containers-image:5.0.0
-
cpe:2.3:a:containers-image_project:containers-image:5.1.0
-
cpe:2.3:o:redhat:enterprise_linux:8.0