Affected by GO-2024-2653
and 6 other vulnerabilities
GO-2024-2653 : HTTP policy bypass in github.com/cilium/cilium
GO-2024-2656 : Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
GO-2024-2657 : Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium
GO-2024-2666 : Insecure IPsec transparent encryption in github.com/cilium/cilium
GO-2024-2922 : Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium
GO-2024-3072 : Policy bypass for Host Firewall policy due to race condition in Cilium agent in github.com/cilium/cilium
GO-2024-3208 : Cilium's CIDR deny policies may not take effect when a more narrow CIDR allow is present in github.com/cilium/cilium
Discover Packages
github.com/cilium/cilium
pkg
cgroups
package
Version:
v1.14.7
Opens a new window with list of versions in this module.
Published: Feb 13, 2024
License: Apache-2.0
Opens a new window with license information.
Imports: 9
Opens a new window with list of imports.
Imported by: 10
Opens a new window with list of known importers.
Documentation
Documentation
¶
Rendered for
linux/amd64
windows/amd64
darwin/amd64
js/wasm
func CheckOrMountCgrpFS(mapRoot string )
CheckOrMountCgrpFS this checks if the cilium cgroup2 root mount point is
mounted and if not mounts it. If mapRoot is "" it will mount the default
location. It is harmless to have multiple cgroupv2 root mounts so unlike
BPFFS case we simply mount at the cilium default regardless if the system
has another mount created by systemd or otherwise.
GetCgroupRoot returns the path for the cgroupv2 mount
Source Files
¶
Directories
¶
Click to show internal directories.
Click to hide internal directories.