Affected by GO-2022-0617
and 11 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1628 : Kubernetes vulnerable to path traversal in k8s.io/kubernetes
GO-2023-1629 : Kubernetes vulnerable to validation bypass in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2170 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2330 : Kubernetes privilege escalation vulnerability in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
test
integration
authutil
package
Version:
v1.24.6
Opens a new window with list of versions in this module.
Published: Sep 21, 2022
License: Apache-2.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Jump to ...
Documentation
Index
Constants
Variables
Functions
GrantUserAuthorization(t, ctx, adminClient, username, rule)
WaitForNamedAuthorizationUpdate(t, ctx, c, user, namespace, verb, resourceName, resource, allowed)
Types
Source Files
Documentation
Documentation
¶
WaitForNamedAuthorizationUpdate checks if the given user can perform the named verb and action on the named resource.
Copied from k8s.io/kubernetes/test/e2e/framework/auth.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.