Affected by GO-2022-0354
and 8 other vulnerabilities
GO-2022-0354 : Code Injection in CRI-O in github.com/cri-o/cri-o
GO-2022-0363 : Sysctls applied to containers with host IPC or host network namespaces can affect the host in github.com/cri-o/cri-o
GO-2022-0426 : Incorrect Default Permissions in CRI-O in github.com/cri-o/cri-o
GO-2022-0480 : Node DOS by way of memory exhaustion through ExecSync request in CRI-O in github.com/cri-o/cri-o
GO-2022-0608 : Incorrect Permission Assignment for Critical Resource in CRI-O in github.com/cri-o/cri-o
GO-2022-1014 : CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure in github.com/cri-o/cri-o
GO-2022-1206 : CRI-O vulnerable to /etc/passwd tampering resulting in Privilege Escalation in github.com/cri-o/cri-o
GO-2024-2458 : CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o
GO-2024-2791 : CRI-O vulnerable to an arbitrary systemd property injection in github.com/cri-o/cri-o
Discover Packages
github.com/cri-o/cri-o
internal
criocli
package
Version:
v1.19.4
Opens a new window with list of versions in this module.
Published: Sep 9, 2021
License: Apache-2.0
Opens a new window with license information.
Imports: 8
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
View Source
var DefaultCommands = []*cli.Command{
completion(),
man(),
markdown(),
}
DefaultCommands are the flags commands can be added to every binary
DefaultsPath is the path to default configuration files set at build time
func GetFlagsAndMetadata() ([]cli.Flag, map[string ]interface{}, error )
func StringSliceTrySplit(ctx *cli.Context, name string ) []string
StringSliceTrySplit parses the string slice from the CLI context.
If the parsing returns just a single item, then we try to parse them by `,`
to allow users to provide their flags comma separated.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.