Affected by GO-2021-0085
and 9 other vulnerabilities
GO-2021-0085 : Authorization bypass in github.com/opencontainers/runc
GO-2022-0396 : Devices resource list treated as a blacklist by default in github.com/opencontainers/runc
GO-2022-0452 : Default inheritable capabilities for linux container should be empty in github.com/opencontainers/runc
GO-2022-0835 : Information Exposure in RunC in github.com/opencontainers/runc
GO-2022-0914 : Mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs in github.com/opencontainers/runc
GO-2023-1682 : Rootless: /sys/fs/cgroup is writable when cgroupns isn't unshared in github.com/opencontainers/runc
GO-2023-1683 : AppArmor bypass with symlinked /proc in github.com/opencontainers/runc
GO-2024-3110 : Can be confused to create empty files/directories on the host in github.com/opencontainers/runc
GO-2025-3543 : WITHDRAWN: Libcontainer is affected by capabilities elevation in github.com/opencontainers/runc
GO-2025-4098 : Container escape and DDoS due to arbitrary write gadgets and procfs write redirects in github.com/opencontainers/runc
Discover Packages
github.com/opencontainers/runc
libcontainer
utils
package
Version:
v0.0.8
Opens a new window with list of versions in this module.
Published: Feb 10, 2016
License: Apache-2.0
Opens a new window with license information.
Imports: 9
Opens a new window with list of imports.
Imported by: 767
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
CleanPath makes a path safe for use with filepath.Join. This is done by not
only cleaning the path, but also (if the path is relative) adding a leading
'/' and cleaning it (then removing the leading '/'). This ensures that a
path resulting from prepending another path will always resolve to lexically
be a subdirectory of the prefixed path. This is all done lexically, so paths
that include symlinks won't be safe as a result of using CleanPath.
ExitStatus returns the correct exit status for a process based on if it
was signaled or exited cleanly
GenerateRandomName returns a new name joined with a prefix. This size
specified is used to truncate the randomly generated value
ResolveRootfs ensures that the current working directory is
not a symlink and returns the absolute path to the rootfs
WriteJSON writes the provided struct v to w using standard json marshaling
Source Files
¶
Click to show internal directories.
Click to hide internal directories.