It was discovered that containerd could be made to expose sensitive information when processing URLs in container image manifests. A remote attacker could use this to trick the user and obtain the user's registry credentials.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "containerd", "binary_version": "1.2.6-0ubuntu1~16.04.4" }, { "binary_name": "golang-github-docker-containerd-dev", "binary_version": "1.2.6-0ubuntu1~16.04.4" } ] }