Affected by GO-2022-0617
and 23 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0802 : Kubernetes kubectl cp Vulnerable to Symlink Attack in k8s.io/kubernetes
GO-2022-0867 : Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : ANSI escape characters not filtered in kubectl in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : Vulnerable to policy bypass in kube-apiserver in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak for users of Ceph RBD via Log File in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak for VSphere users via Log File in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2025-3521 : Kubernetes GitRepo Volume Inadvertent Local Repository Access in k8s.io/kubernetes
GO-2025-3522 : Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API in k8s.io/kubernetes
GO-2025-3547 : Kubernetes kube-apiserver Vulnerable to Race Condition in k8s.io/kubernetes
GO-2025-3915 : Kubernetes Nodes can delete themselves by adding an OwnerReference in k8s.io/kubernetes
GO-2025-4240 : Half-blind Server Side Request Forgery in kube-controller-manager through in-tree Portworx StorageClass in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
scheduler
algorithm
priorities
util
package
Version:
v1.15.6-beta.0
Opens a new window with list of versions in this module.
Published: Oct 15, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
DefaultMemoryRequest defines default memory request size.
DefaultMilliCPURequest defines default milli cpu request number.
func GetNamespacesFromPodAffinityTerm(pod *v1.Pod, podAffinityTerm *v1.PodAffinityTerm) sets .String
GetNamespacesFromPodAffinityTerm returns a set of names
according to the namespaces indicated in podAffinityTerm.
If namespaces is empty it considers the given pod's namespace.
func GetNonzeroRequests(requests *v1.ResourceList) (int64 , int64 )
GetNonzeroRequests returns the default resource request if none is found or
what is provided on the request.
func NodesHaveSameTopologyKey(nodeA, nodeB *v1.Node, topologyKey string ) bool
NodesHaveSameTopologyKey checks if nodeA and nodeB have same label value with given topologyKey as label key.
Returns false if topologyKey is empty.
PodMatchesTermsNamespaceAndSelector returns true if the given <pod>
matches the namespace and selector defined by <affinityPod>`s <term>.
type Topologies struct {
DefaultKeys []string
}
Topologies contains topologies information of nodes.
NodesHaveSameTopologyKey checks if nodeA and nodeB have same label value with given topologyKey as label key.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.