First published: Thu Oct 15 2020(Updated: )
It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/containerd | <1.2.6-0ubuntu1~16.04.4 | 1.2.6-0ubuntu1~16.04.4 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this containerd vulnerability is CVE-2020-15157.
The severity of this containerd vulnerability is not mentioned in the provided information.
containerd is an open and reliable container runtime that provides a common API for cross-platform container operations.
A remote attacker can exploit this vulnerability by tricking a user and obtaining their registry credentials.
To fix this containerd vulnerability, you should update containerd to version 1.2.6-0ubuntu1~16.04.4 or later.