Affected by GO-2022-0617
and 23 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0703 : XML Entity Expansion and Improper Input Validation in Kubernetes API server in k8s.io/kubernetes
GO-2022-0802 : Kubernetes kubectl cp Vulnerable to Symlink Attack in k8s.io/kubernetes
GO-2022-0867 : Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2025-3465 : Node Denial of Service via kubelet Checkpoint API in k8s.io/kubernetes
GO-2025-3521 : Kubernetes GitRepo Volume Inadvertent Local Repository Access in k8s.io/kubernetes
GO-2025-3522 : Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API in k8s.io/kubernetes
GO-2025-3547 : Kubernetes kube-apiserver Vulnerable to Race Condition in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
kubectl
util
package
Version:
v1.15.4
Opens a new window with list of versions in this module.
Published: Sep 13, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
func HashObject(obj runtime.Object, codec runtime.Codec) (string, error)
func LookupContainerPortNumberByName(pod v1.Pod, name string) (int32, error)
func LookupContainerPortNumberByServicePort(svc v1.Service, pod v1.Pod, port int32) (int32, error)
func LookupServicePortNumberByName(svc v1.Service, name string) (int32, error)
func ParseFileSource(source string) (keyName, filePath string, err error)
func ParseLiteralSource(source string) (keyName, value string, err error)
func ParseRFC3339(s string, nowFn func() metav1.Time) (metav1.Time, error)
func Umask(mask int) (old int, err error)
HashObject returns the hash of a Object hash by a Codec
LookupContainerPortNumberByName find containerPort number by its named port name
LookupContainerPortNumberByServicePort implements
the handling of resolving container named port, as well as ignoring targetPort when clusterIP=None
It returns an error when a named port can't find a match (with -1 returned), or when the service does not
declare such port (with the input port number returned).
LookupServicePortNumberByName find service port number by its named port name
ParseFileSource parses the source given.
Acceptable formats include:
1. source-path: the basename will become the key name
2. source-name=source-path: the source-name will become the key name and
source-path is the path to the key file.
Key names cannot include '='.
ParseLiteralSource parses the source key=val pair into its component pieces.
This functionality is distinguished from strings.SplitN(source, "=", 2) since
it returns an error in the case of empty keys, values, or a missing equals sign.
ParseRFC3339 parses an RFC3339 date in either RFC3339Nano or RFC3339 format.
Umask is a wrapper for `unix.Umask()` on non-Windows platforms
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.