Affected by GO-2022-0617
and 18 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782 : Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985 : Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
Godeps
_workspace
src
github.com
docker
libcontainer
console
package
Version:
v0.14.0
Opens a new window with list of versions in this module.
Published: Mar 30, 2015
License: Apache-2.0, Apache-2.0
Opens a new window with license information.
Imports: 6
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
func CreateMasterAndConsole() (*os.File, string, error)
func Ioctl(fd uintptr, flag, data uintptr) error
func OpenAndDup(consolePath string) error
func OpenPtmx() (*os.File, error)
func OpenTerminal(name string, flag int) (*os.File, error)
func Ptsname(f *os.File) (string, error)
func Setup(rootfs, consolePath, mountLabel string) error
func Unlockpt(f *os.File) error
CreateMasterAndConsole will open /dev/ptmx on the host and retreive the
pts name for use as the pty slave inside the container
OpenPtmx opens /dev/ptmx, i.e. the PTY master.
OpenTerminal is a clone of os.OpenFile without the O_CLOEXEC
used to open the pty slave inside the container namespace
Ptsname retrieves the name of the first available pts for the given master.
func Setup(rootfs, consolePath, mountLabel string ) error
Setup initializes the proper /dev/console inside the rootfs path
Unlockpt unlocks the slave pseudoterminal device corresponding to the master pseudoterminal referred to by f.
Unlockpt should be called before opening the slave side of a pseudoterminal.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.