Affected by GO-2022-0617
and 22 other vulnerabilities
GO-2022-0617 : WITHDRAWN: Potential proxy IP restriction bypass in Kubernetes in k8s.io/kubernetes
GO-2022-0802 : Kubernetes kubectl cp Vulnerable to Symlink Attack in k8s.io/kubernetes
GO-2022-0867 : Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes in k8s.io/kubernetes
GO-2022-0885 : Improper Authentication in Kubernetes in k8s.io/kubernetes
GO-2022-0890 : Server Side Request Forgery (SSRF) in Kubernetes in k8s.io/kubernetes
GO-2022-0907 : Access Restriction Bypass in kube-apiserver in k8s.io/kubernetes
GO-2022-0910 : Files or Directories Accessible to External Parties in kubernetes in k8s.io/kubernetes
GO-2022-0983 : kubectl ANSI escape characters not filtered in k8s.io/kubernetes
GO-2023-1864 : Kubelet vulnerable to bypass of seccomp profile enforcement in k8s.io/kubernetes
GO-2023-1891 : kube-apiserver vulnerable to policy bypass in k8s.io/kubernetes
GO-2023-1892 : Kubernetes mountable secrets policy bypass in k8s.io/kubernetes
GO-2023-2159 : Kube-proxy may unintentionally forward traffic in k8s.io/kubernetes
GO-2023-2341 : Kubernetes Improper Input Validation vulnerability in k8s.io/kubernetes
GO-2024-2748 : Privilege Escalation in Kubernetes in k8s.io/apimachinery
GO-2024-2753 : Denial of service in Kubernetes in k8s.io/kubernetes
GO-2024-2754 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2755 : Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
GO-2024-2994 : Kubernetes sets incorrect permissions on Windows containers logs in k8s.io/kubernetes
GO-2024-3277 : Kubernetes Nil pointer dereference in KCM after v1 HPA patch request in k8s.io/kubernetes
GO-2025-3465 : Node Denial of Service via kubelet Checkpoint API in k8s.io/kubernetes
GO-2025-3521 : Kubernetes GitRepo Volume Inadvertent Local Repository Access in k8s.io/kubernetes
GO-2025-3522 : Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API in k8s.io/kubernetes
GO-2025-3547 : Kubernetes kube-apiserver Vulnerable to Race Condition in k8s.io/kubernetes
Discover Packages
k8s.io/kubernetes
pkg
kubelet
server
portforward
package
Version:
v1.15.9
Opens a new window with list of versions in this module.
Published: Jan 17, 2020
License: Apache-2.0
Opens a new window with license information.
Imports: 17
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Package portforward contains server-side logic for handling port forwarding requests.
View Source
const ProtocolV1Name = "portforward.k8s.io"
ProtocolV1Name is the name of the subprotocol used for port forwarding.
SupportedProtocols are the supported port forwarding protocols.
ServePortForward handles a port forwarding request. A single request is
kept alive as long as the client is still alive and the connection has not
been timed out due to idleness. This function handles multiple forwarded
connections; i.e., multiple `curl http://localhost:8888/ ` requests will be
handled by a single invocation of ServePortForward.
PortForwarder knows how to forward content from a data stream to/from a port
in a pod.
type V4Options struct {
Ports []int32
}
V4Options contains details about which streams are required for port
forwarding.
All fields included in V4Options need to be expressed explicitly in the
CRI (k8s.io/cri-api/pkg/apis/{version}/api.proto) PortForwardRequest.
BuildV4Options returns a V4Options based on the given information.
NewV4Options creates a new options from the Request.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.