Intel

AIKIDO-2026-10353

github.com/containerd/containerd/v2 is vulnerable to Generation of Error Message Containing Sensitive Information

Generation of Error Message Containing Sensitive Information Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

30

Low Risk

This Affects:

GOgithub.com/containerd/containerd/v2
2.0.0 - 2.2.1
Fixed in 2.2.2

TL;DR

Affected versions of this package improperly sanitize container runtime errors due to the SanitizeError call being executed inside a defer, causing Go to evaluate errgrpc.ToGRPC(err) before sanitization occurs. As a result, the gRPC error returned to kubelet may contain sensitive information such as SAS tokens embedded in image pull URLs. An attacker with access to Kubernetes pod events (e.g., via kubectl describe pod) could trigger image pull failures and observe the resulting error messages to harvest exposed credentials from the unsanitized gRPC response.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

github.com/containerd/containerd/v2 is vulnerable to Generation of Error Message Containing Sensitive Information in versions 2.0.0 - 2.2.1.

How to fix this

Upgrade the github.com/containerd/containerd/v2 library to the patch version.