Intel

AIKIDO-2025-10626

github.com/opencontainers/umoci is vulnerable to Uncontrolled Resource Consumption

Uncontrolled Resource Consumption Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

10

Low Risk

This Affects:

gogithub.com/opencontainers/umoci
0.4.4 - 0.5.0
Fixed in 0.5.1

TL;DR

Affected versions of this package are vulnerable to a Denial-of-Service (DoS) attack because they implicitly allowed the creation of image descriptors with a negative or unknown size. An attacker could exploit this by providing a maliciously crafted image manifest containing such a descriptor, which, when processed, would cause an infinite read loop or excessive resource consumption, ultimately crashing the application. This flaw is due to an overly permissive interpretation of the specification, which has since been clarified to explicitly disallow unknown sizes for most descriptors as they are a classic DoS vector.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

github.com/opencontainers/umoci is vulnerable to Uncontrolled Resource Consumption in versions 0.4.4 - 0.5.0.

How to fix this

Upgrade the github.com/opencontainers/umoci library to the patch version.