Skip to content

chore(deps): bump github.com/containerd/containerd/v2 from 2.2.2 to 2.2.4#293

Open
dependabot[bot] wants to merge 1 commit into
masterfrom
dependabot/go_modules/github.com/containerd/containerd/v2-2.2.4
Open

chore(deps): bump github.com/containerd/containerd/v2 from 2.2.2 to 2.2.4#293
dependabot[bot] wants to merge 1 commit into
masterfrom
dependabot/go_modules/github.com/containerd/containerd/v2-2.2.4

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 21, 2026

Bumps github.com/containerd/containerd/v2 from 2.2.2 to 2.2.4.

Release notes

Sourced from github.com/containerd/containerd/v2's releases.

containerd 2.2.4

Welcome to the v2.2.4 release of containerd!

The fourth patch release for containerd 2.2 contains various fixes and updates including security patches.

  • containerd

  • go-jose

  • Use mount manager during image volume processing to support snapshotters that require writable block volumes (e.g., EROFS) (#13242)

  • Fix handling of out-of-range USER values in OCI spec to avoid unexpected username/group lookups (#13448)

  • Apply hardening to block AF_ALG in default socket policy (#13408)

  • Fix bugs in sandbox service affecting sandbox creation configuration and event publishing (#13266)

  • Set AppArmor abi conditionally to support versions < 3.0 (#13275)

  • Disable overlay "rebase" capability when running in a user namespace to fix layer extraction failures (#13393)

  • Support both "volatile" and "fsync=volatile" mount options for volatile snapshotter (#13296)

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

  • Wei Fu
  • Akihiro Suda
  • Chris Henzie
  • Paweł Gronowski
  • Samuel Karp
  • Brian Goff
  • Champ-Goblem
  • Chris Chang
  • LEI WANG
  • Phil Estes
  • William Myers
  • oci: return explicit error for out-of-range USER values (#13448)
    • d20c6267b oci: return explicit error for out-of-range USER values
  • seccomp: Block AF_ALG in default socket policy (#13408)
    • db34dc4b4 seccomp: Block AF_ALG in default socket policy
    • 214b141ee seccomp: Document socket rule scope and socketcall limitation
  • update Go to 1.25.10, 1.26.3 (#13375)
  • overlay: disable "rebase" capability when running in UserNS (#13393)
    • 63874d262 overlay: disable "rebase" capability when running in UserNS
  • Support both styles of volatile mount option (#13296)

... (truncated)

Commits
  • 193637f Merge pull request #13457 from samuelkarp/prepare-release-2.2.4
  • 05e97b4 Prepare release notes for v2.2.4
  • 0a8f65b Merge pull request #13448 from samuelkarp/oci-withuser-errrange-2.2
  • 7287de2 Merge pull request #13408 from k8s-infra-cherrypick-robot/cherry-pick-13327-t...
  • db34dc4 seccomp: Block AF_ALG in default socket policy
  • 214b141 seccomp: Document socket rule scope and socketcall limitation
  • 105ca97 Merge pull request #13375 from AkihiroSuda/release-2.2-go-1.25.10
  • ba7b585 Merge pull request #13393 from k8s-infra-cherrypick-robot/cherry-pick-13389-t...
  • 63874d2 overlay: disable "rebase" capability when running in UserNS
  • c2b1856 update Go to 1.25.10, 1.26.3
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/containerd/containerd/v2](https://github.com/containerd/containerd) from 2.2.2 to 2.2.4.
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](containerd/containerd@v2.2.2...v2.2.4)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd/v2
  dependency-version: 2.2.4
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels May 21, 2026
@dependabot dependabot Bot requested a review from a team as a code owner May 21, 2026 22:04
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels May 21, 2026
@codacybeta codacybeta enabled auto-merge (squash) May 21, 2026 22:04
@codacy-production
Copy link
Copy Markdown

Up to standards ✅

🟢 Issues 0 issues

Results:
0 new issues

View in Codacy

🟢 Metrics 0 duplication

Metric Results
Duplication 0

View in Codacy

AI Reviewer: first review requested successfully. AI can make mistakes. Always validate suggestions.

Run reviewer

TIP This summary will be updated as you push new changes.

Copy link
Copy Markdown

@codacy-production codacy-production Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR is intended to update github.com/containerd/containerd/v2 from version 2.2.2 to 2.2.4 to address security vulnerabilities CVE-2026-46680 and CVE-2026-34986. While the project is currently 'up to standards' according to Codacy, the implementation of the version bump is missing from the pull request. The required changes to go.mod and go.sum are not present in the diff, which prevents the security patches from being applied and the PR from fulfilling its purpose.

About this PR

  • The pull request does not contain the necessary changes to go.mod and go.sum to update the github.com/containerd/containerd/v2 dependency. Please ensure the files are updated and the checksums are correctly regenerated to apply the security fixes.

Test suggestions

  • Verify the project builds successfully with containerd v2.2.4
Prompt proposal for missing tests
Consider implementing these tests if applicable:
1. Verify the project builds successfully with containerd v2.2.4

TIP Improve review quality by adding custom instructions
TIP How was this review? Give us feedback

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update Go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant