Affected by GO-2022-0344
and 7 other vulnerabilities
GO-2022-0344 : containerd CRI plugin: Insecure handling of image volumes in github.com/containerd/containerd
GO-2022-0360 : Ambiguous OCI manifest parsing in github.com/containerd/containerd
GO-2022-0482 : containerd CRI plugin: Host memory exhaustion through ExecSync in github.com/containerd/containerd
GO-2022-0784 : containerd-shim API Exposed to Host Network Containers in github.com/containerd/containerd
GO-2022-0803 : containerd v1.2.x can be coerced into leaking credentials during image pull in github.com/containerd/containerd
GO-2022-0921 : Archive package allows chmod of file outside of unpack target directory in github.com/containerd/containerd
GO-2022-0938 : Insufficiently restricted permissions on plugin directories in github.com/containerd/containerd
GO-2022-1147 : containerd CRI stream server vulnerable to host memory exhaustion via terminal in github.com/containerd/containerd
The highest tagged major version is
v2 .
Discover Packages
github.com/containerd/containerd
metrics
cgroups
package
Version:
v1.2.0-rc.1
Opens a new window with list of versions in this module.
Published: Oct 3, 2018
License: Apache-2.0
Opens a new window with license information.
Imports: 20
Opens a new window with list of imports.
Imported by: 141
Opens a new window with list of known importers.
Documentation
Documentation
¶
View Source
var (
ErrAlreadyCollected = errors .New ("cgroup is already being collected")
ErrCgroupNotExists = errors .New ("cgroup does not exist in the collector")
)
New returns a new cgroups monitor
type Config struct {
NoPrometheus bool `toml:"no_prometheus"`
}
Config for the cgroups monitor
Trigger will be called when an event happens and provides the cgroup
where the event originated from
Source Files
¶
Click to show internal directories.
Click to hide internal directories.