Affected by GO-2022-0617
and 16 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0908 : Incomplete List of Disallowed Inputs in Kubernetes in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
util
procfs
package
Version:
v1.18.1
Opens a new window with list of versions in this module.
Published: Apr 8, 2020
License: Apache-2.0
Opens a new window with license information.
Imports: 14
Opens a new window with list of imports.
Imported by: 285
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
Package procfs implements utility functions relating to the /proc mount.
PKill finds process(es) using a regular expression and send a specified
signal to each process.
PidOf finds process(es) with a specified name (regexp match)
and return their pid(s).
GetFullContainerName gets the container name given the root process id of the container.
E.g. if the devices cgroup for the container is stored in /sys/fs/cgroup/devices/docker/nginx,
return docker/nginx. Assumes that the process is part of exactly one cgroup hierarchy.
ProcFS provides a helper for getting container name via pid.
GetFullContainerName gets the container name given the root process id of the container.
E.g. if the devices cgroup for the container is stored in /sys/fs/cgroup/devices/docker/nginx,
return docker/nginx. Assumes that the process is part of exactly one cgroup hierarchy.
type ProcFSInterface interface {
GetFullContainerName(pid int ) (string , error )
}
NewProcFS returns a ProcFS object.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.