[release/2.2] Prepare release notes for v2.2.3#13224
Merged
dmcgowan merged 1 commit intocontainerd:release/2.2from Apr 14, 2026
Merged
[release/2.2] Prepare release notes for v2.2.3#13224dmcgowan merged 1 commit intocontainerd:release/2.2from
dmcgowan merged 1 commit intocontainerd:release/2.2from
Conversation
dims
approved these changes
Apr 13, 2026
chrishenzie
approved these changes
Apr 13, 2026
hsiangkao
approved these changes
Apr 14, 2026
Signed-off-by: Samuel Karp <[email protected]>
4c8449a to
8a0f4ed
Compare
Member
Author
estesp
approved these changes
Apr 14, 2026
jaredledvina
added a commit
to DataDog/containerd
that referenced
this pull request
Apr 22, 2026
containerd 2.2.3 Welcome to the v2.2.3 release of containerd! The third patch release for containerd 2.2 contains various fixes and updates including a security patch. * **spdystream** * [**CVE-2026-35469**](GHSA-pc3f-x583-g7j2) * Preserve cgroup mount options for privileged containers ([containerd#13120](containerd#13120)) * Ensure UpdatePodSandbox returns Unimplemented instead of a generic error ([containerd#13023](containerd#13023)) * Handle absolute symlinks in rootfs user lookup to fix regressions when using Go 1.24 ([containerd#13015](containerd#13015)) * Enable mount manager in diff walking to fix layer extraction errors with some snapshotters (e.g., EROFS) ([containerd#13198](containerd#13198)) * Apply hardening to prevent TOCTOU race during tar extraction ([containerd#12971](containerd#12971)) * Restore support for client-mounted roots in Windows containers using process isolation ([containerd#13195](containerd#13195)) * Update runc to v1.3.5 ([containerd#13061](containerd#13061)) * Apply absolute symlink resolution to /etc/group in OCI spec to fix lookups on NixOS-style systems ([containerd#13019](containerd#13019)) * Handle absolute symlinks in rootfs user lookup to fix regressions when using Go 1.24 ([containerd#13015](containerd#13015)) * Fix bug that caused whiteouts to be ignored when parallel unpack was used ([containerd#13125](containerd#13125)) Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues. * Samuel Karp * Sebastiaan van Stijn * Maksym Pavlenko * Chris Henzie * Derek McGowan * Paulo Oliveira * Henry Wang * Phil Estes * Wei Fu * Akihiro Suda * Gao Xiang * Ricardo Branco * Shachar Tal <details><summary>40 commits</summary> <p> * Prepare release notes for v2.2.3 ([containerd#13224](containerd#13224)) * [`8a0f4ed5d`](containerd@8a0f4ed) Prepare release notes for v2.2.3 * update github.com/moby/spdystream v0.5.1 ([containerd#13217](containerd#13217)) * [`31bd34a06`](containerd@31bd34a) update github.com/moby/spdystream v0.5.1 * vendor: github.com/klauspost/compress v1.18.5 ([containerd#13197](containerd#13197)) * [`1336f6c45`](containerd@1336f6c) vendor: github.com/klauspost/compress v1.18.5 * diff/walking: enable mount manager ([containerd#13198](containerd#13198)) * [`409f75be8`](containerd@409f75b) diff/walking: enable mount manager * update runhcs to v0.14.1 ([containerd#13195](containerd#13195)) * [`3f33146c1`](containerd@3f33146) update runhcs to v0.14.1 * vendor: github.com/Microsoft/hcsshim v0.14.1 ([containerd#13196](containerd#13196)) * [`8bd1b74e5`](containerd@8bd1b74) vendor: github.com/Microsoft/hcsshim v0.14.1 * [`c6b0be8e1`](containerd@c6b0be8) vendor: github.com/Microsoft/hcsshim v0.14.0 * update to Go 1.25.9, 1.26.2 ([containerd#13190](containerd#13190)) * [`2ecde8cfe`](containerd@2ecde8c) update to Go 1.25.9, 1.26.2 * Skip TestExportAndImportMultiLayer on s390x ([containerd#13154](containerd#13154)) * [`be554f478`](containerd@be554f4) Skip TestExportAndImportMultiLayer on s390x * Tweak mount info for overlayfs in case of parallel unpack ([containerd#13125](containerd#13125)) * [`660de195b`](containerd@660de19) Tweak mount info for overlayfs in case of parallel unpack * [`bc9274a4b`](containerd@bc9274a) Add integration test for issue 13030 * Preserve cgroup mount options for privileged containers ([containerd#13120](containerd#13120)) * [`c387890b5`](containerd@c387890) Add integration test for privileged container cgroup mounts * [`047a335a6`](containerd@047a335) Forward RUNC_FLAVOR env var down to integration tests * [`9b2d72ee0`](containerd@9b2d72e) Preserve host cgroup mount options for privileged containers * [`5b66cd6a0`](containerd@5b66cd6) Move cgroup namespace placement higher in spec builder * update runc binary to v1.3.5 ([containerd#13061](containerd#13061)) * [`584205c2f`](containerd@584205c) [release/2.2] update runc binary to v1.3.5 * Fix vagrant on CI ([containerd#13066](containerd#13066)) * [`77c6886df`](containerd@77c6886) Ignore NOCHANGE error * Fix TOCTOU race bug in tar extraction ([containerd#12971](containerd#12971)) * [`fbed68b8f`](containerd@fbed68b) Fix TOCTOU race bug in tar extraction * cri: UpdatePodSandbox should return Unimplemented ([containerd#13023](containerd#13023)) * [`a83510103`](containerd@a835101) cri: UpdatePodSandbox should return Unimplemented * fix(oci): apply absolute symlink resolution to /etc/group ([containerd#13019](containerd#13019)) * [`ee4179e52`](containerd@ee4179e) fix(oci): apply absolute symlink resolution to /etc/group * fix(oci): handle absolute symlinks in rootfs user lookup ([containerd#13015](containerd#13015)) * [`fd061b848`](containerd@fd061b8) test(oci): use fstest and mock fs for better symlink coverage * [`5d44d2c22`](containerd@5d44d2c) fix(oci): handle absolute symlinks in rootfs user lookup * update to go1.25.8, test go1.26.1 ([containerd#13011](containerd#13011)) * [`00c776f07`](containerd@00c776f) update to go1.25.8, test go1.26.1 </p> </details> * **github.com/Microsoft/hcsshim** v0.14.0-rc.1 -> v0.14.1 * **github.com/klauspost/compress** v1.18.1 -> v1.18.5 * **github.com/moby/spdystream** v0.5.0 -> v0.5.1 Previous release can be found at [v2.2.2](https://github.com/containerd/containerd/releases/tag/v2.2.2) * `containerd-<VERSION>-<OS>-<ARCH>.tar.gz`: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04). * `containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz`: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent. In addition to containerd, typically you will have to install [runc](https://github.com/opencontainers/runc/releases) and [CNI plugins](https://github.com/containernetworking/plugins/releases) from their official sites too. See also the [Getting Started](https://github.com/containerd/containerd/blob/main/docs/getting-started.md) documentation.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
containerd 2.2.3
Welcome to the v2.2.3 release of containerd!
The third patch release for containerd 2.2 contains various fixes
and updates including a security patch.
Security Updates
Highlights
Container Runtime Interface (CRI)
Go client
Runtime
Snapshotters
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
39 commits
8a0f4ed5dPrepare release notes for v2.2.331bd34a06update github.com/moby/spdystream v0.5.11336f6c45vendor: github.com/klauspost/compress v1.18.5409f75be8diff/walking: enable mount manager3f33146c1update runhcs to v0.14.18bd1b74e5vendor: github.com/Microsoft/hcsshim v0.14.1c6b0be8e1vendor: github.com/Microsoft/hcsshim v0.14.02ecde8cfeupdate to Go 1.25.9, 1.26.2be554f478Skip TestExportAndImportMultiLayer on s390x660de195bTweak mount info for overlayfs in case of parallel unpackbc9274a4bAdd integration test for issue 13030c387890b5Add integration test for privileged container cgroup mounts047a335a6Forward RUNC_FLAVOR env var down to integration tests9b2d72ee0Preserve host cgroup mount options for privileged containers5b66cd6a0Move cgroup namespace placement higher in spec builder584205c2f[release/2.2] update runc binary to v1.3.577c6886dfIgnore NOCHANGE errorfbed68b8fFix TOCTOU race bug in tar extractiona83510103cri: UpdatePodSandbox should return Unimplementedee4179e52fix(oci): apply absolute symlink resolution to /etc/groupfd061b848test(oci): use fstest and mock fs for better symlink coverage5d44d2c22fix(oci): handle absolute symlinks in rootfs user lookup00c776f07update to go1.25.8, test go1.26.1Dependency Changes
Previous release can be found at v2.2.2
Which file should I download?
containerd-<VERSION>-<OS>-<ARCH>.tar.gz: ✅Recommended. Dynamically linked with glibc 2.35 (Ubuntu 22.04).containerd-static-<VERSION>-<OS>-<ARCH>.tar.gz: Statically linked. Expected to be used on Linux distributions that do not use glibc >= 2.35. Not position-independent.In addition to containerd, typically you will have to install runc
and CNI plugins from their official sites too.
See also the Getting Started documentation.