Affected by GO-2022-0500
and 7 other vulnerabilities
GO-2022-0500: CloudCore UDS Server: Malicious Message can crash CloudCore in github.com/kubeedge/kubeedge
GO-2022-0501: CloudCore CSI Driver: Malicious response from KubeEdge can crash CSI Driver controller server in github.com/kubeedge/kubeedge
GO-2022-0507: KubeEdge Edge ServiceBus module DoS in github.com/kubeedge/kubeedge
GO-2022-0508: KubeEdge Cloud AdmissionController component DoS in github.com/kubeedge/kubeedge
GO-2022-0509: KubeEdge DoS when signing the CSR from EdgeCore in github.com/kubeedge/kubeedge
GO-2022-0510: KubeEdge CloudCore Router memory exhaustion vulnerability in github.com/kubeedge/kubeedge
GO-2022-0511: KubeEdge Cloud Stream and Edge Stream DoS from large stream message in github.com/kubeedge/kubeedge
GO-2022-0512: DoS in KubeEdge's Websocket Client in package Viaduct in github.com/kubeedge/kubeedge
package
Version:
v1.6.1
Opens a new window with list of versions in this module.
Published: Mar 19, 2021
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 3
Opens a new window with list of known importers.
Documentation
¶
IsMatch return true if the path match rule using regex
func RuleContains(rulePath, rule2Path string) bool
RuleContains return true if rule 1 contains rule 2, e.g., path /a contains /a/b
URLToURLRegex return url regex and replace {} in url,e.g.,/abc/{Aa1} to /abc/[-A-Za-z0-9+&@#%?=~_|!:,.;]+/?
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.