The flaw could allow attackers to access restricted container images, potentially leading to privilege escalation, data theft ...