USN-4589-1: containerd vulnerability
15 October 2020
containerd could be made to expose sensitive information over the network.
Releases
Packages
- containerd - daemon to control containers
Details
It was discovered that containerd could be made to expose sensitive
information when processing URLs in container image manifests. A
remote attacker could use this to trick the user and obtain the
user's registry credentials.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
After a standard system update you need to restart containerd to make
all the necessary changes.
References
Related notices
- USN-4589-2: vim-syntax-docker, docker-doc, docker.io, golang-github-docker-docker-dev, golang-docker-dev