Affected by GO-2022-0617
and 17 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0782 : Symlink Attack in kubectl cp in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-1985 : Kubernetes in OpenShift3 Access Control Misconfiguration in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
util
errors
package
Version:
v0.9.1
Opens a new window with list of versions in this module.
Published: Jan 23, 2015
License: Apache-2.0
Opens a new window with license information.
Imports: 1
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package errors implements various utility functions and types around errors.
FilterOut removes all errors that match any of the matchers from the input
error. If the input is a singular error, only that error is tested. If the
input implements the Aggregate interface, the list of errors will be
processed recursively.
This can be used, for example, to remove known-OK errors (such as io.EOF or
os.PathNotFound) from a list of errors.
type Aggregate interface {
error
Errors() []error
}
Aggregate represents an object that contains multiple errors, but does not
necessarily have singular semantic meaning.
Flatten takes an Aggregate, which may hold other Aggregates in arbitrary
nesting, and flattens them all into a single Aggregate, recursively.
NewAggregate converts a slice of errors into an Aggregate interface, which
is itself an implementation of the error interface. If the slice is empty,
this returns nil.
Matcher is used to match errors. Returns true if the error matches.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.