Affected by GO-2022-0617
and 19 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0703 : XML Entity Expansion and Improper Input Validation in Kubernetes API server in k8s.io/kubernetes
GO-2022-0867 : Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
ssh
package
Version:
v1.15.2
Opens a new window with list of versions in this module.
Published: Aug 1, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 23
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
func EncodePrivateKey(private *rsa.PrivateKey) []byte
func EncodePublicKey(public *rsa.PublicKey) ([]byte, error)
func EncodeSSHKey(public *rsa.PublicKey) ([]byte, error)
func GenerateKey(bits int) (*rsa.PrivateKey, *rsa.PublicKey, error)
func MakePrivateKeySignerFromBytes(buffer []byte) (ssh.Signer, error)
func MakePrivateKeySignerFromFile(key string) (ssh.Signer, error)
func ParsePublicKeyFromFile(keyFile string) (*rsa.PublicKey, error)
func RunSSHCommand(cmd, user, host string, signer ssh.Signer) (string, string, int, error)
type SSHTunnelList
RunSSHCommand returns the stdout, stderr, and exit code from running cmd on
host as specific user, along with any SSH-level error.
If user=="", it will default (like SSH) to os.Getenv("USER")
type SSHTunnelList struct {
}
Update reconciles the list's entries with the specified addresses. Existing
tunnels that are not in addresses are removed from entries and closed in a
background goroutine. New tunnels specified in addresses are opened in a
background goroutine and then added to entries.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.