Affected by GO-2023-2078
and 11 other vulnerabilities
GO-2023-2078 : Kubernetes users may update Pod labels to bypass network policy in github.com/cilium/cilium
GO-2023-2079 : Specific Cilium configurations vulnerable to DoS via Kubernetes annotations in github.com/cilium/cilium
GO-2023-2080 : Cilium vulnerable to bypass of namespace restrictions in CiliumNetworkPolicy in github.com/cilium/cilium
GO-2024-2568 : Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium
GO-2024-2569 : Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium
GO-2024-2653 : HTTP policy bypass in github.com/cilium/cilium
GO-2024-2656 : Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
GO-2024-2657 : Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium
GO-2024-2666 : Insecure IPsec transparent encryption in github.com/cilium/cilium
GO-2024-2922 : Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium
GO-2024-3072 : Policy bypass for Host Firewall policy due to race condition in Cilium agent in github.com/cilium/cilium
GO-2024-3208 : Cilium's CIDR deny policies may not take effect when a more narrow CIDR allow is present in github.com/cilium/cilium
Discover Packages
github.com/cilium/cilium
pkg
fqdn
restore
package
Version:
v1.14.1
Opens a new window with list of versions in this module.
Published: Aug 11, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 1
Opens a new window with list of imports.
Imported by: 8
Opens a new window with list of known importers.
Documentation
Documentation
¶
The restore package provides data structures important to restoring
DNS proxy rules. This package serves as a central source for these
structures.
Note that these are marshaled as JSON and any changes need to be compatible
across an upgrade!
DNSRules contains IP-based DNS rules for a set of ports (e.g., 53)
Sort is only used for testing
Sorts in place, but returns DNSRules for convenience
IPRule stores the allowed destination IPs for a DNS names matching a regex
IPRules is an unsorted collection of IPrules
Sort is only used for testing
Sorts in place, but returns IPRules for convenience
type RuleRegex struct {
Pattern *string
}
RuleRegex is a wrapper for a pointer to a string so that we can define marshalers for it.
MarshalText marshals RuleRegex as string
UnmarshalText unmarshals json into a RuleRegex
This must have a pointer receiver, otherwise the RuleRegex remains empty.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.