When malicious images are pulled by isula pull, attackers can execute arbitrary code.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Isula | Openeuler | 2.0.8-20210518.144540 (including) | 2.0.8-20210518.144540 (including) |
Isula | Openeuler | 2.0.18-10 (including) | 2.0.18-10 (including) |
Isula | Openeuler | 2.1.2 (including) | 2.1.2 (including) |