Affected by GO-2022-0393
and 12 other vulnerabilities
GO-2022-0393 : Network policy may be bypassed by some ICMP Echo Requests in github.com/cilium/cilium
GO-2022-0457 : Access to Unix domain socket can lead to privileges escalation in Cilium in github.com/cilium/cilium
GO-2022-0458 : Improper Privilege Management in Cilium in github.com/cilium/cilium
GO-2022-0959 : Network Policies & (Clusterwide) Cilium Network Policies with namespace label selectors may unexpectedly select pods with maliciously crafted labels in github.com/cilium/cilium
GO-2023-1643 : Potential network policy bypass when routing IPv6 traffic in github.com/cilium/cilium
GO-2023-1730 : Debug mode leaks confidential data in Cilium in github.com/cilium/cilium
GO-2023-1785 : Potential HTTP policy bypass when using header rules in Cilium in github.com/cilium/cilium
GO-2023-2078 : Kubernetes users may update Pod labels to bypass network policy in github.com/cilium/cilium
GO-2023-2079 : Specific Cilium configurations vulnerable to DoS via Kubernetes annotations in github.com/cilium/cilium
GO-2023-2080 : Cilium vulnerable to bypass of namespace restrictions in CiliumNetworkPolicy in github.com/cilium/cilium
GO-2024-2656 : Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
GO-2024-2666 : Insecure IPsec transparent encryption in github.com/cilium/cilium
GO-2024-3072 : Policy bypass for Host Firewall policy due to race condition in Cilium agent in github.com/cilium/cilium
Discover Packages
github.com/cilium/cilium
pkg
fqdn
restore
package
Version:
v1.7.11
Opens a new window with list of versions in this module.
Published: Oct 28, 2020
License: Apache-2.0
Opens a new window with license information.
Imports: 2
Opens a new window with list of imports.
Imported by: 8
Opens a new window with list of known importers.
Documentation
Documentation
¶
The restore package provides data structures important to restoring
DNS proxy rules. This package serves as a central source for these
structures.
Note that these are marshaled as JSON and any changes need to be compatible
accross an upgrade!
DNSRules contains IP-based DNS rules for a set of ports (e.g., 53)
Sort is only used for testing
Sorts in place, but returns DNSRules for convenience
IPRule stores the allowed destination IPs for a DNS names matching a regex
IPRules is an unsorted collection of IPrules
Sort is only used for testing
Sorts in place, but returns IPRules for convenience
RuleRegex is a wrapper for *regexp.Regexp so that we can define marshalers for it.
MarshalText marshals RuleRegex as string
UnmarshalText unmarshals json into a RuleRegex
This must have a pointer receiver, otherwise the RuleRegex remains empty.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.