Affected by GO-2023-2078
and 10 other vulnerabilities
GO-2023-2078 : Kubernetes users may update Pod labels to bypass network policy in github.com/cilium/cilium
GO-2023-2079 : Specific Cilium configurations vulnerable to DoS via Kubernetes annotations in github.com/cilium/cilium
GO-2023-2080 : Cilium vulnerable to bypass of namespace restrictions in CiliumNetworkPolicy in github.com/cilium/cilium
GO-2024-2568 : Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium
GO-2024-2569 : Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium
GO-2024-2653 : HTTP policy bypass in github.com/cilium/cilium
GO-2024-2656 : Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
GO-2024-2657 : Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium
GO-2024-2666 : Insecure IPsec transparent encryption in github.com/cilium/cilium
GO-2024-2922 : Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium
GO-2024-3072 : Policy bypass for Host Firewall policy due to race condition in Cilium agent in github.com/cilium/cilium
Discover Packages
github.com/cilium/cilium
pkg
hubble
build
package
Version:
v1.14.0
Opens a new window with list of versions in this module.
Published: Jul 27, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 2
Opens a new window with list of imports.
Imported by: 2
Opens a new window with list of known importers.
Documentation
Documentation
¶
Version defines a detailed Hubble component version.
SemVer returns the version as a Semantic Versioning 2.0.0 compatible string
(see semver.org).
String returns the full version string with a leading v in the version
string itself. E.g. "hubble-relay v1.9.0+g63aa1b8".
Source Files
¶
Click to show internal directories.
Click to hide internal directories.