CVE-2020-1702
Summary
| CVE | CVE-2020-1702 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-27 20:15:00 UTC |
| Updated | 2021-06-10 15:16:00 UTC |
| Description | A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| 1792796 – (CVE-2020-1702) CVE-2020-1702 containers/image: Container images read entire image manifest into memory |
MISC |
bugzilla.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159667 Oracle Enterprise Linux Security Update for container-tools:ol8 (ELSA-2020-1650)
- 377377 Alibaba Cloud Linux Security Update for container-tools:rhel8 (ALINUX3-SA-2021:0013)
- 770025 Red Hat OpenShift Container Platform 4.4.3 Security Update (RHSA-2020:1937)
- 940531 AlmaLinux Security Update for container-tools:rhel8 (ALSA-2020:1650)
- 960829 Rocky Linux Security Update for container-tools:rhel8 (RLSA-2020:1650)