Affected by GO-2024-2653
and 10 other vulnerabilities
GO-2024-2653: HTTP policy bypass in github.com/cilium/cilium
GO-2024-2656: Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
GO-2024-2657: Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium
GO-2024-2666: Insecure IPsec transparent encryption in github.com/cilium/cilium
GO-2024-2922: Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium
GO-2024-3071: Gateway API route matching order contradicts specification in github.com/cilium/cilium
GO-2024-3072: Policy bypass for Host Firewall policy due to race condition in Cilium agent in github.com/cilium/cilium
GO-2024-3074: Cilium leaks information via incorrect ReferenceGrant update logic in Gateway API in github.com/cilium/cilium
GO-2024-3208: Cilium's CIDR deny policies may not take effect when a more narrow CIDR allow is present in github.com/cilium/cilium
GO-2025-3415: DoS in Cilium agent DNS proxy from crafted DNS responses in github.com/cilium/cilium
GO-2025-3416: Cilium has an information leakage via insecure default Hubble UI CORS header in github.com/cilium/cilium
package
Version:
v1.15.1
Opens a new window with list of versions in this module.
Published: Feb 14, 2024
License: Apache-2.0
Opens a new window with license information.
Imports: 3
Opens a new window with list of imports.
Imported by: 2
Opens a new window with list of known importers.
Documentation
¶
type HttpHeadersList struct {
}
HttpHeadersList contains the allow/deny list of headers
type HubbleRedactSettings struct {
Enabled bool
RedactHTTPQuery bool
RedactHTTPUserInfo bool
RedactKafkaAPIKey bool
}
HubbleRedactSettings contains all hubble redact related options
Option is used to configure parsers
CacheSize configures the amount of L7 requests cached for latency calculation
Redact configures which data Hubble will redact.
Options contains all parser options
Source Files
¶
Click to show internal directories.
Click to hide internal directories.