Affected by GO-2022-0278
and 6 other vulnerabilities
GO-2022-0278 : Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux in github.com/containerd/containerd
GO-2022-0344 : containerd CRI plugin: Insecure handling of image volumes in github.com/containerd/containerd
GO-2022-0360 : Ambiguous OCI manifest parsing in github.com/containerd/containerd
GO-2022-0482 : containerd CRI plugin: Host memory exhaustion through ExecSync in github.com/containerd/containerd
GO-2022-0921 : Archive package allows chmod of file outside of unpack target directory in github.com/containerd/containerd
GO-2022-0938 : Insufficiently restricted permissions on plugin directories in github.com/containerd/containerd
GO-2022-1147 : containerd CRI stream server vulnerable to host memory exhaustion via terminal in github.com/containerd/containerd
The highest tagged major version is
v2 .
Discover Packages
github.com/containerd/containerd
identifiers
package
Version:
v1.5.2
Opens a new window with list of versions in this module.
Published: May 19, 2021
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 433
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package identifiers provides common validation for identifiers and keys
across containerd.
Identifiers in containerd must be a alphanumeric, allowing limited
underscores, dashes and dots.
While the character set may be expanded in the future, identifiers
are guaranteed to be safely used as filesystem path components.
Validate returns nil if the string s is a valid identifier.
identifiers are similar to the domain name rules according to RFC 1035, section 2.3.1 . However
rules in this package are relaxed to allow numerals to follow period (".") and mixed case is
allowed.
In general identifiers that pass this validation should be safe for use as filesystem path components.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.