Affected by GO-2023-2078
and 15 other vulnerabilities
GO-2023-2078 : Kubernetes users may update Pod labels to bypass network policy in github.com/cilium/cilium
GO-2023-2079 : Specific Cilium configurations vulnerable to DoS via Kubernetes annotations in github.com/cilium/cilium
GO-2023-2080 : Cilium vulnerable to bypass of namespace restrictions in CiliumNetworkPolicy in github.com/cilium/cilium
GO-2024-2568 : Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium
GO-2024-2569 : Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium
GO-2024-2653 : HTTP policy bypass in github.com/cilium/cilium
GO-2024-2656 : Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
GO-2024-2657 : Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium
GO-2024-2666 : Insecure IPsec transparent encryption in github.com/cilium/cilium
GO-2024-2922 : Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium
GO-2024-3072 : Policy bypass for Host Firewall policy due to race condition in Cilium agent in github.com/cilium/cilium
GO-2024-3208 : Cilium's CIDR deny policies may not take effect when a more narrow CIDR allow is present in github.com/cilium/cilium
GO-2025-3415 : DoS in Cilium agent DNS proxy from crafted DNS responses in github.com/cilium/cilium
GO-2025-3416 : Cilium has an information leakage via insecure default Hubble UI CORS header in github.com/cilium/cilium
GO-2025-3635 : In Cilium, packets from terminating endpoints may not be encrypted in Wireguard-enabled clusters in github.com/cilium/cilium
GO-2025-4167 : Cilium with misconfigured toGroups in policies can lead to unrestricted egress traffic in Ciliumgithub.com/cilium/cilium
Discover Packages
github.com/cilium/cilium
pkg
inctimer
package
Version:
v1.14.1
Opens a new window with list of versions in this module.
Published: Aug 11, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 1
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
After wraps the time.After function to get around the /timeafter linter
warning for cases where it is inconvenient to use the instantiated version.
IncTimer should be the preferred mechanism over
calling `time.After` when wanting an `After`-like
function in a loop. This prevents memory build up
as the `time.After` method creates a new timer
instance every time it is called, and it is not
garbage collected until after it fires. Conversely,
IncTimer only uses one timer and correctly stops
the timer, clears its channel, and resets it
everytime that `After` is called.
New creates a new IncTimer and a done function.
IncTimer only uses one timer and correctly stops
the timer, clears the channel, and resets it every
time the `After` function is called.
WARNING: Concurrent use is not expected. The use
of this timer should be for only one goroutine.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.