Affected by GO-2022-0426
and 6 other vulnerabilities
GO-2022-0426: Incorrect Default Permissions in CRI-O in github.com/cri-o/cri-o
GO-2022-0480: Node DOS by way of memory exhaustion through ExecSync request in CRI-O in github.com/cri-o/cri-o
GO-2022-0608: Incorrect Permission Assignment for Critical Resource in CRI-O in github.com/cri-o/cri-o
GO-2022-1014: CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure in github.com/cri-o/cri-o
GO-2022-1206: CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation in github.com/cri-o/cri-o
GO-2024-2458: CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o
GO-2024-2791: CRI-O vulnerable to an arbitrary systemd property injection in github.com/cri-o/cri-o
package
Version:
v1.12.9
Opens a new window with list of versions in this module.
Published: Mar 16, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 1
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
type ContainerInfo struct {
Name string `json:"name"`
Pid int `json:"pid"`
Image string `json:"image"`
ImageRef string `json:"image_ref"`
CreatedTime int64 `json:"created_time"`
Labels map[string]string `json:"labels"`
Annotations map[string]string `json:"annotations"`
CrioAnnotations map[string]string `json:"crio_annotations"`
LogPath string `json:"log_path"`
Root string `json:"root"`
Sandbox string `json:"sandbox"`
IP string `json:"ip_address"`
}
ContainerInfo stores information about containers
type CrioInfo struct {
StorageDriver string `json:"storage_driver"`
StorageRoot string `json:"storage_root"`
CgroupDriver string `json:"cgroup_driver"`
DefaultIDMappings IDMappings `json:"default_id_mappings"`
}
CrioInfo stores information about the crio daemon
IDMappings specifies the ID mappings used for containers.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.