Affected by GO-2022-0617
and 22 other vulnerabilities
GO-2022-0617: WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0703: XML Entity Expansion and Improper Input Validation in Kubernetes API server in k8s.io/kubernetes
GO-2022-0802: Kubernetes kubectl cp Vulnerable to Symlink Attack in k8s.io/kubernetes
GO-2022-0867: Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes in k8s.io/kubernetes
GO-2022-0885: Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890: Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907: Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910: Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983: kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864: Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891: kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892: Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159: Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2170: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330: Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341: Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748: Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753: Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994: Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277: Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2024-3286: Kubernetes kubelet arbitrary command execution in k8s.io/kubernetes
package
Version:
v1.15.3
Opens a new window with list of versions in this module.
Published: Aug 16, 2019
License: Apache-2.0
Opens a new window with license information.
Imports: 12
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
-
func DaemonSetFromManifest(fileName, ns string) (*apps.DaemonSet, error)
-
func IngressFromManifest(fileName string) (*networkingv1beta1.Ingress, error)
-
func IngressToManifest(ing *networkingv1beta1.Ingress, path string) error
-
func PodFromManifest(filename string) (*v1.Pod, error)
-
func RcFromManifest(fileName string) (*v1.ReplicationController, error)
-
func RoleFromManifest(fileName, ns string) (*rbac.Role, error)
-
func StatefulSetFromManifest(fileName, ns string) (*apps.StatefulSet, error)
-
func SvcFromManifest(fileName string) (*v1.Service, error)
DaemonSetFromManifest returns a DaemonSet from a manifest stored in fileName in the Namespace indicated by ns.
IngressFromManifest reads a .json/yaml file and returns the ingress in it.
IngressToManifest generates a yaml file in the given path with the given ingress.
Assumes that a directory exists at the given path.
PodFromManifest reads a .json/yaml file and returns the pod in it.
RcFromManifest reads a .json/yaml file and returns the rc in it.
RoleFromManifest returns a Role from a manifest stored in fileName in the Namespace indicated by ns.
StatefulSetFromManifest returns a StatefulSet from a manifest stored in fileName in the Namespace indicated by ns.
SvcFromManifest reads a .json/yaml file and returns the service in it.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.