Affected by GO-2022-0281
and 9 other vulnerabilities
GO-2022-0281 : Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman in github.com/containers/podman
GO-2022-0416 : Podman's default inheritable capabilities for linux container not empty in github.com/containers/podman
GO-2022-1151 : Buildah (as part of Podman) vulnerable to Link Following in github.com/containers/podman
GO-2023-1927 : Podman Path Traversal Vulnerability leads to arbitrary file read/write in github.com/containers/podman
GO-2023-1942 : Podman Symlink Vulnerability in github.com/containers/libpod
GO-2024-3042 : Podman vulnerable to memory-based denial of service in github.com/containers/podman
GO-2024-3169 : Improper Input Validation in Buildah and Podman in github.com/containers/buildah
GO-2025-3777 : Podman Improper Certificate Validation; machine missing TLS verification in github.com/containers/podman
GO-2025-3935 : podman kube play symlink traversal vulnerability in github.com/containers/podman
GO-2025-3961 : Podman Creates Temporary File with Insecure Permissions in github.com/containers/podman
The highest tagged major version is
v5 .
Discover Packages
github.com/containers/podman
pkg
rootless
package
Version:
v0.8.5
Opens a new window with list of versions in this module.
Published: Aug 31, 2018
License: Apache-2.0
Opens a new window with license information.
Imports: 15
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
BecomeRootInUserNS re-exec podman in a new userNS. It returns whether podman was re-executed
into a new user namespace and the return code from the re-executed podman process.
If podman was re-executed the caller needs to propagate the error code returned by the child
process.
func GetRootlessUID() int
GetRootlessUID returns the UID of the user in the parent userNS
IsRootless tells us if we are running in rootless mode
JoinNS re-exec podman in a new userNS and join the user namespace of the specified
PID.
func SetSkipStorageSetup(v bool )
SetSkipStorageSetup tells the runtime to not setup containers/storage
func SkipStorageSetup() bool
SkipStorageSetup tells if we should skip the containers/storage setup
Source Files
¶
Click to show internal directories.
Click to hide internal directories.