The HTTP client used to connect to the container registry authorization service explicitly disables TLS verification, allowing an attacker that is able to MITM the connection to steal credentials.
{
    "url": "https://pkg.go.dev/vuln/GO-2021-0081",
    "review_status": "REVIEWED"
}{
    "imports": [
        {
            "symbols": [
                "CheckAuth",
                "GetRepositoryTags",
                "Image.GetRepositoryTags",
                "NewReference",
                "ParseReference",
                "SearchRegistry",
                "dockerClient.getBearerToken",
                "dockerImageDestination.PutBlob",
                "dockerImageDestination.PutManifest",
                "dockerImageDestination.PutSignatures",
                "dockerImageDestination.SupportsSignatures",
                "dockerImageDestination.TryReusingBlob",
                "dockerImageSource.GetBlob",
                "dockerImageSource.GetManifest",
                "dockerImageSource.GetSignatures",
                "dockerReference.DeleteImage",
                "dockerReference.NewImage",
                "dockerReference.NewImageDestination",
                "dockerReference.NewImageSource",
                "dockerReference.PolicyConfigurationIdentity",
                "dockerTransport.ParseReference"
            ],
            "path": "github.com/containers/image/docker"
        }
    ]
}