A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
| Vendor | Product | Versions |
|---|---|---|
| ? | ? | 0, 5.30.0 |
| Red Hat | OADP | 1.3-RHEL-9 — 1.3.4-9 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-4 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-3 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-3 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-3 |
| Red Hat | Red Hat Advanced Cluster Security 4.4 | 4.4.5-3 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-1 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Advanced Cluster Security 4.5 | 4.5.2-2 |
| Red Hat | Red Hat Enterprise Linux 8 | 8100020240808093819.afee755d |
| Red Hat | Red Hat Enterprise Linux 9 | 2:1.37.2-1.el9 |
| Red Hat | Red Hat Enterprise Linux 9 | 2:1.16.1-1.el9 |
| Red Hat | Red Hat Enterprise Linux 9 | 2:5.2.2-1.el9 |
| Red Hat | Red Hat Migration Toolkit for Containers 1.8 | v1.8.4-22 |
| Red Hat | Red Hat OpenShift Container Platform 4.13 | 3:4.4.1-14.rhaos4.13.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.13 | 2:1.11.3-3.rhaos4.13.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.14 | v4.14.0-202407260439.p0.g8d9b39e.assembly.stream.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.14 | 3:4.4.1-19.rhaos4.14.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.14 | 2:1.11.3-3.rhaos4.14.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409172305.p0.g17536c8.assembly.stream.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409171307.p0.ged4651a.assembly.stream.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409161436.p0.g1f44c02.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409120135.p0.gf7f5eed.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409131835.p0.gadccbd5.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409120135.p0.g8425d88.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409130735.p0.gc03231f.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409131635.p0.gb73e37f.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409161836.p0.g092d15b.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409180105.p0.g1fdd5b0.assembly.stream.el9 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409180905.p0.gf6f61ca.assembly.stream.el8 |
| Red Hat | Red Hat OpenShift Container Platform 4.15 | v4.15.0-202409171307.p0.g160e7ca.assembly.stream.el8 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.