Information Exposure Affecting github.com/containerd/containerd/remotes/docker package, versions <1.2.14


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.3% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDREMOTESDOCKER-1019358
  • published18 Oct 2020
  • disclosed18 Oct 2020
  • creditBrad Geesaman, Josh Larsen, Ian Coldwater, Duffie Cooley, Rory McCune

Introduced: 18 Oct 2020

CVE-2020-15157  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/containerd/containerd/remotes/docker to version 1.2.14 or higher.

Overview

github.com/containerd/containerd/remotes/docker is a docker container runtime with an emphasis on simplicity, robustness and portability.

Affected versions of this package are vulnerable to Information Exposure. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it.

CVSS Scores

version 3.1