It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.2.6-0ubuntu1~16.04.4", "binary_name": "containerd" }, { "binary_version": "1.2.6-0ubuntu1~16.04.4", "binary_name": "golang-github-docker-containerd-dev" } ] }