Versions Packages Information History CVEs Related Badges Report

Packages for containerd

180 package(s) known

containerd

1.2.7 Potentially vulnerable (1.2.7-r0)

containerd-doc

1.2.7 Potentially vulnerable (1.2.7-r0)

containerd

1.2.9 Potentially vulnerable (1.2.9-r0)

containerd-doc

1.2.9 Potentially vulnerable (1.2.9-r0)

containerd

1.3.9 Potentially vulnerable (1.3.9-r0)

containerd-doc

1.3.9 Potentially vulnerable (1.3.9-r0)

containerd

1.4.4 Potentially vulnerable (1.4.4-r0)

containerd-doc

1.4.4 Potentially vulnerable (1.4.4-r0)

containerd-openrc

1.4.4 Potentially vulnerable (1.4.4-r0)

containerd-stress

1.4.4 Potentially vulnerable (1.4.4-r0)

containerd

1.4.8 Potentially vulnerable (1.4.8-r0)

containerd-doc

1.4.8 Potentially vulnerable (1.4.8-r0)

containerd-openrc

1.4.8 Potentially vulnerable (1.4.8-r0)

containerd-stress

1.4.8 Potentially vulnerable (1.4.8-r0)

containerd

1.5.8 Potentially vulnerable (1.5.8-r1)

containerd-doc

1.5.8 Potentially vulnerable (1.5.8-r1)

containerd-openrc

1.5.8 Potentially vulnerable (1.5.8-r1)

containerd-stress

1.5.8 Potentially vulnerable (1.5.8-r1)

containerd

1.5.11 Potentially vulnerable (1.5.11-r2)

containerd-doc

1.5.11 Potentially vulnerable (1.5.11-r2)

containerd-openrc

1.5.11 Potentially vulnerable (1.5.11-r2)

containerd-stress

1.5.11 Potentially vulnerable (1.5.11-r2)

containerd

1.6.8 (1.6.8-r1)

containerd-doc

1.6.8 (1.6.8-r1)

containerd-openrc

1.6.8 (1.6.8-r1)

containerd-stress

1.6.8 (1.6.8-r1)

containerd

1.6.8 (1.6.8-r1)

containerd-doc

1.6.8 (1.6.8-r1)

containerd-openrc

1.6.8 (1.6.8-r1)

containerd-stress

1.6.8 (1.6.8-r1)

containerd

1.3.9 Potentially vulnerable (1.3.9-alt1)

containerd

1.4.12 Potentially vulnerable (1.4.12-alt1)

containerd

1.6.8 (1.6.8-alt1)

containerd

1.4.13 Potentially vulnerable (1.4.13-2.1.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.13 Potentially vulnerable (1.4.13-3.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.6 Potentially vulnerable (1.4.6-2.7.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.6 Potentially vulnerable (1.4.6-7.11.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.6 Potentially vulnerable (1.4.6-8.12.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.6 Potentially vulnerable (1.4.6-3.9.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.1 Potentially vulnerable (1.4.1-2.6.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.4.1 Potentially vulnerable (1.4.1-1.5.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.3.2 Potentially vulnerable (1.3.2-1.3.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.2.6 Potentially vulnerable (1.2.6-1.2.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT

containerd

1.2.6 Potentially vulnerable (1.2.6-1.0.amzn1)
  • Summary:
    An industry-standard container runtime with an emphasis on simplicity, robustness and portability
  • Category:
    • Unspecified
  • License:
    • Apache 2.0 and MIT
Apertis v2022
v2022/development

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2+apertis0)
Apertis v2023 Development
v2023dev1/development

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u1+apertis0)
Arch
community

containerd

1.6.8 (1.6.8-1)

containerd

1.5.9 Potentially vulnerable (1.5.9-2.0)

containerd

1.6.8 (1.6.8-1.0)

containerd

1.6.8 (1.6.8-1)

containerd

1.6.8 (1.6.8-1)

containerd

1.6.8 (1.6.8-1)

containerd

1.6.8 (1.6.8-1)

containerd-git

v1.1.0.rc.2.r0.gf630d5f0 (v1.1.0.rc.2.r0.gf630d5f0-1)
Artix
galaxy

containerd

1.6.8 (1.6.8-1)

containerd

1.2.6 Potentially vulnerable (1.2.6-0ubuntu1~18.04.2)
CRUX 3.4
contrib

containerd

bb71b10 Potentially vulnerable
CRUX 3.5
contrib

containerd

1.3.9 Potentially vulnerable
CRUX 3.6
contrib

containerd

1.6.8
CRUX 3.7
contrib

containerd

1.6.8
Devuan 4.0
chimaera/main

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)
Devuan Unstable
unstable/main

containerd

1.6.8 (1.6.8~ds1-1)
Exherbo
virtualization

sys-apps/containerd

1.6.8
Fedora 27
updates

containerd

1.0.3 Potentially vulnerable (1.0.3-1.fc27)
Fedora 28
updates

containerd

1.2.1 Potentially vulnerable (1.2.1-1.fc28)
Fedora 28
release

containerd

1.0.3 Potentially vulnerable (1.0.3-1.fc28)
Fedora 29
updates

containerd

1.2.1 Potentially vulnerable (1.2.1-1.fc29)
Fedora 29
release

containerd

1.1.2 Potentially vulnerable (1.1.2-1.fc29)
Fedora 30
release

containerd

1.2.4 Potentially vulnerable (1.2.4-1.fc30)
Fedora 31
updates

containerd

1.3.3 Potentially vulnerable (1.3.3-1.fc31)
Fedora 31
release

containerd

1.2.6 Potentially vulnerable (1.2.6-2.20190627gitd68b593.fc31)
Fedora 32
updates

containerd

1.3.3 Potentially vulnerable (1.3.3-1.fc32)
Fedora 32
release

containerd

1.2.6 Potentially vulnerable (1.2.6-2.20190627gitd68b593.fc31)
Fedora 33
updates

containerd

1.4.4 Potentially vulnerable (1.4.4-1.fc33)
Fedora 33
release

containerd

1.3.3 Potentially vulnerable (1.3.3-1.fc33)
Fedora 34
updates

containerd

1.6.4 Potentially vulnerable (1.6.4-1.fc34)
Fedora 34
release

containerd

1.5.0~beta3 Potentially vulnerable (1.5.0~beta.3-1.fc34)
Fedora 35
updates

containerd

1.6.8 (1.6.8-4.fc35)
Fedora 35
release

containerd

1.5.5 Potentially vulnerable (1.5.5-1.fc35)
Fedora 36
updates

containerd

1.6.8 (1.6.8-4.fc36)
Fedora 36
release

containerd

1.6.1 Potentially vulnerable (1.6.1-1.fc36)
Fedora 37
development

containerd

1.6.8 (1.6.8-4.fc37)
Fedora Rawhide
development

containerd

1.6.8 (1.6.8-4.fc38)

sysutils/containerd

1.6.6 (1.6.6_6)
Funtoo 1.4
core-kit

app-emulation/containerd

1.6.6
Funtoo 1.4
core-kit

app-emulation/containerd

1.5.13

app-containers/containerd

1.6.8

containerd

1.4.4 Potentially vulnerable

containerd

1.6.8 (1.6.8~ds1-1)
KaOS
apps

containerd

1.6.8 (1.6.8-1)

app-containers/containerd

1.6.8

app-containers/containerd

1.6.8
Manjaro Stable
community

containerd

1.6.8 (1.6.8-1)
Manjaro Testing
community

containerd

1.6.8 (1.6.8-1)

containerd

1.6.8 (1.6.8-1)

containerd

1.5.7 Potentially vulnerable

containerd

1.5.9 Potentially vulnerable

containerd

1.4.11 Potentially vulnerable

containerd

1.6.8

containerd

1.6.8

containerd

1.2.0 Potentially vulnerable (1.2.0-101.oe1)

containerd

1.2.0 Potentially vulnerable (1.2.0-300.oe2203)
openmamba
devel

containerd

1.6.8 (1.6.8-1mamba)
OpenMandriva 4.0
main/release

containerd

1.2.4 Potentially vulnerable (1:1.2.4-1)
OpenMandriva 4.1
main/release

containerd

1.3.2 Potentially vulnerable (1:1.3.2-1)
OpenMandriva 4.2
main/release

containerd

1.4.3 Potentially vulnerable (1:1.4.3-2)

containerd

1.6.7 (1.6.7-1)
OpenMandriva Cooker
main/release

containerd

1.6.7 (1.6.7-1)
openSUSE Leap 42.3
updates/oss

containerd

1.2.2 Potentially vulnerable (1.2.2-22.1)
openSUSE Leap 42.3
updates/oss

containerd

1.1.2 Potentially vulnerable (1.1.2-19.2)
openSUSE Leap 42.3
updates/oss

containerd

0.2.9 Potentially vulnerable (0.2.9+gitr706_06b9cb351610-16.1)
openSUSE Leap 42.3
updates/oss

containerd

0.2.5 Potentially vulnerable (0.2.5+gitr639_422e31c-13.1)

containerd

0.2.5 Potentially vulnerable (0.2.5+gitr569_2a5e70c-11.2)
openSUSE Leap 15.0
updates/oss

containerd

1.2.6 Potentially vulnerable (1.2.6-lp150.4.17.1)
openSUSE Leap 15.0
updates/oss

containerd

1.2.5 Potentially vulnerable (1.2.5-lp150.4.14.3)

containerd

0.2.9 Potentially vulnerable (0.2.9+gitr706_06b9cb351610-lp150.3.3)
openSUSE Leap 15.1
updates/oss

containerd

1.2.13 Potentially vulnerable (1.2.13-lp151.2.12.1)
openSUSE Leap 15.1
updates/oss

containerd

1.2.10 Potentially vulnerable (1.2.10-lp151.2.9.1)
openSUSE Leap 15.1
updates/oss

containerd

1.2.6 Potentially vulnerable (1.2.6-lp151.2.6.1)
openSUSE Leap 15.1
updates/oss

containerd

1.2.5 Potentially vulnerable (1.2.5-lp151.2.3.1)

containerd

1.2.2 Potentially vulnerable (1.2.2-lp151.1.2)
openSUSE Leap 15.2
updates/oss

containerd

1.4.11 Potentially vulnerable (1.4.11-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

containerd

1.4.4 Potentially vulnerable (1.4.4-lp152.2.6.1)
openSUSE Leap 15.2
updates/oss

containerd

1.4.4 Potentially vulnerable (1.4.4-lp152.2.9.1)
openSUSE Leap 15.2
updates/oss

containerd

1.3.9 Potentially vulnerable (1.3.9-lp152.2.3.1)

containerd

1.2.13 Potentially vulnerable (1.2.13-lp152.1.1)

containerd

1.2.5 Potentially vulnerable (1.2.5-5.13.1)

containerd

1.4.12 Potentially vulnerable (1.4.12-150000.65.1)

containerd

1.6.6 (1.6.6-1.2)

containerd

1.6.6 (1.6.6-1)
Parabola
community

containerd

1.6.8 (1.6.8-1)

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)
Pardus 21
updates/main

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)

containerd

1.4.12 Potentially vulnerable (1.4.12~ds1-1~deb11u1)

containerd

1.4.5 Potentially vulnerable (1.4.5~ds1-2)
Parrot
parrot-updates/main

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)
Parrot
parrot/main

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)

containerd

1.6.8

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)

containerd

1.4.13 Potentially vulnerable (1.4.13~ds1-1~deb11u2)

containerd

1.6.8 (1.6.8~ds1-1)
Rosa 2021.1
main/release

containerd

1.6.4 Potentially vulnerable (1:1.6.4-1)
Rosa 2021.1
contrib/release

containerd

1.5.5 Potentially vulnerable (1:1.5.5-1)
Scoop
main

containerd

1.6.8

system/containerd

1.6.8

containerd

1.6.8

containerd-dbginfo

1.6.8
Trisquel 8.0
flidas-updates/main

containerd

1.2.6 Potentially vulnerable (1.2.6-0ubuntu1~16.04.6)
Trisquel 9.0
etiona-updates/main

containerd

1.5.5 Potentially vulnerable (1.5.5-0ubuntu3~18.04.2)
Trisquel 9.0
etiona/main

containerd

0.2.5 Potentially vulnerable (0.2.5-0ubuntu2)
Trisquel 10.0
nabia-updates/main

containerd

1.5.9 Potentially vulnerable (1.5.9-0ubuntu1~20.04.4)
Trisquel 10.0
nabia-updates/main

containerd

1.5.5 Potentially vulnerable (1.5.5-0ubuntu3~20.04.2)
Trisquel 10.0
nabia/main

containerd

1.3.3 Potentially vulnerable (1.3.3-0ubuntu2)
Ubuntu 16.04
xenial-updates/universe

containerd

1.2.6 Potentially vulnerable (1.2.6-0ubuntu1~16.04.6+esm1)
Ubuntu 18.04
bionic-updates/universe

containerd

1.5.5 Potentially vulnerable (1.5.5-0ubuntu3~18.04.2)
Ubuntu 20.04
focal-updates/main

containerd

1.5.9 Potentially vulnerable (1.5.9-0ubuntu1~20.04.4)

containerd

1.6.8 (1.6.8_1)