Affected by GO-2022-0281
and 6 other vulnerabilities
GO-2022-0281 : Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman in github.com/containers/podman
GO-2022-0416 : Podman's default inheritable capabilities for linux container not empty in github.com/containers/podman
GO-2022-1151 : Buildah (as part of Podman) vulnerable to Link Following in github.com/containers/podman
GO-2023-1927 : Podman Path Traversal Vulnerability leads to arbitrary file read/write in github.com/containers/podman
GO-2023-1942 : Podman Symlink Vulnerability in github.com/containers/libpod
GO-2024-3042 : Podman vulnerable to memory-based denial of service in github.com/containers/podman
GO-2024-3169 : Improper Input Validation in Buildah and Podman in github.com/containers/buildah
The highest tagged major version is
v5 .
Discover Packages
github.com/containers/podman
pkg
rootless
package
Version:
v0.8.2
Opens a new window with list of versions in this module.
Published: Aug 10, 2018
License: Apache-2.0
Opens a new window with license information.
Imports: 13
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
BecomeRootInUserNS re-exec podman in a new userNS. It returns whether podman was re-executed
into a new user namespace and the return code from the re-executed podman process.
If podman was re-executed the caller needs to propagate the error code returned by the child
process.
func GetRootlessUID() int
GetRootlessUID returns the UID of the user in the parent userNS
IsRootless tells us if we are running in rootless mode
Source Files
¶
Click to show internal directories.
Click to hide internal directories.