Vulnerability Database
Blog
FAQ
Docs
GO-2023-2078
See a problem?
Source
https://pkg.go.dev/vuln/GO-2023-2078
Import Source
https://vuln.go.dev/ID/GO-2023-2078.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2023-2078
Aliases
BIT-cilium-2023-39347
BIT-cilium-operator-2023-39347
BIT-cilium-proxy-2023-39347
BIT-hubble-2023-39347
BIT-hubble-relay-2023-39347
BIT-hubble-ui-2023-39347
BIT-hubble-ui-backend-2023-39347
CVE-2023-39347
GHSA-gj2r-phwg-6rww
Published
2024-08-21T14:30:18Z
Modified
2024-08-21T14:56:46.941655Z
Summary
Kubernetes users may update Pod labels to bypass network policy in github.com/cilium/cilium
Details
Kubernetes users may update Pod labels to bypass network policy in github.com/cilium/cilium
References
https://github.com/cilium/cilium/security/advisories/GHSA-gj2r-phwg-6rww
https://nvd.nist.gov/vuln/detail/CVE-2023-39347
https://docs.cilium.io/en/latest/security/threat-model/#kubernetes-api-server-attacker
Affected packages
Go
/
github.com/cilium/cilium
Package
Name
github.com/cilium/cilium
View open source insights on deps.dev
Purl
pkg:golang/github.com/cilium/cilium
Affected ranges
Type
SEMVER
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.12.14
Introduced
1.13.0
Fixed
1.13.7
Introduced
1.14.0
Fixed
1.14.2
GO-2023-2078 - OSV