containerd v1.2.x can be coerced into leaking credentials during image pull
References: https://www.openwall.com/lists/oss-security/2020/10/15/1 https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c https://github.com/containerd/containerd/releases/tag/v1.2.14
External References: https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c https://github.com/containerd/containerd/releases/tag/v1.2.14 https://www.openwall.com/lists/oss-security/2020/10/15/1
Upstream commit with fix: https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726
Statement: In OpenShift Container Platform (OCP) the ose-cluster-autoscaler container ships vulnerable version of the containerd package, but only containerd api is used by the container. The vulnerable code is not delivered, hence marked as wontfix.
Created containerd tracking bugs for this issue: Affects: epel-7 [bug 1890620]
Acknowledgments: Name: The containerd project Upstream: Brad Geesaman, Josh Larsen, Ian Coldwater, Duffie Cooley, Rory McCune
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2020:5634 https://access.redhat.com/errata/RHSA-2020:5634
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15157