Affected by GO-2022-0344
and 7 other vulnerabilities
GO-2022-0344 : containerd CRI plugin: Insecure handling of image volumes in github.com/containerd/containerd
GO-2022-0360 : Ambiguous OCI manifest parsing in github.com/containerd/containerd
GO-2022-0482 : containerd CRI plugin: Host memory exhaustion through ExecSync in github.com/containerd/containerd
GO-2022-0784 : containerd-shim API Exposed to Host Network Containers in github.com/containerd/containerd
GO-2022-0803 : containerd v1.2.x can be coerced into leaking credentials during image pull in github.com/containerd/containerd
GO-2022-0921 : Archive package allows chmod of file outside of unpack target directory in github.com/containerd/containerd
GO-2022-0938 : Insufficiently restricted permissions on plugin directories in github.com/containerd/containerd
GO-2022-1147 : containerd CRI stream server vulnerable to host memory exhaustion via terminal in github.com/containerd/containerd
The highest tagged major version is
v2 .
Discover Packages
github.com/containerd/containerd
cmd
ctr
commands
shim
package
Version:
v1.1.4
Opens a new window with list of versions in this module.
Published: Sep 25, 2018
License: Apache-2.0
Opens a new window with license information.
Imports: 18
Opens a new window with list of imports.
Imported by: 103
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
darwin/amd64
js/wasm
View Source
var Command = cli .Command {
Name: "shim",
Usage: "interact with a shim directly",
Flags: []cli .Flag {
cli .StringFlag {
Name: "socket",
Usage: "socket on which to connect to the shim",
},
},
Subcommands: []cli .Command {
deleteCommand,
execCommand,
startCommand,
stateCommand,
},
}
Command is the cli command for interacting with a shim
Source Files
¶
Click to show internal directories.
Click to hide internal directories.