Affected by GO-2022-0344
and 7 other vulnerabilities
GO-2022-0344: containerd CRI plugin: Insecure handling of image volumes in github.com/containerd/containerd
GO-2022-0360: Ambiguous OCI manifest parsing in github.com/containerd/containerd
GO-2022-0482: containerd CRI plugin: Host memory exhaustion through ExecSync in github.com/containerd/containerd
GO-2022-0784: containerd-shim API Exposed to Host Network Containers in github.com/containerd/containerd
GO-2022-0803: containerd v1.2.x can be coerced into leaking credentials during image pull in github.com/containerd/containerd
GO-2022-0921: Archive package allows chmod of file outside of unpack target directory in github.com/containerd/containerd
GO-2022-0938: Insufficiently restricted permissions on plugin directories in github.com/containerd/containerd
GO-2022-1147: containerd CRI stream server vulnerable to host memory exhaustion via terminal in github.com/containerd/containerd
The highest tagged major version is
v2.
package
Version:
v1.1.7
Opens a new window with list of versions in this module.
Published: Apr 5, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 433
Opens a new window with list of known importers.
Documentation
¶
Package identifiers provides common validation for identifiers and keys
across containerd.
Identifiers in containerd must be a alphanumeric, allowing limited
underscores, dashes and dots.
While the character set may be expanded in the future, identifiers
are guaranteed to be safely used as filesystem path components.
Validate return nil if the string s is a valid identifier.
identifiers must be valid domain names according to RFC 1035, section 2.3.1. To
enforce case insensitvity, all characters must be lower case.
In general, identifiers that pass this validation, should be safe for use as
a domain names or filesystem path component.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.