Interpretation Conflict Affecting cilium-fips-1.15 package, versions <1.15.8-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-CILIUMFIPS115-7830005
  • published23 Aug 2024
  • disclosed15 Aug 2024

Introduced: 15 Aug 2024

CVE-2024-42487  (opens in a new tab)
CWE-436  (opens in a new tab)

How to fix?

Upgrade Chainguard cilium-fips-1.15 to version 1.15.8-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cilium-fips-1.15 package and not the cilium-fips-1.15 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In the 1.15 branch prior to 1.15.8 and the 1.16 branch prior to 1.16.1, Gateway API HTTPRoutes and GRPCRoutes do not follow the match precedence specified in the Gateway API specification. In particular, request headers are matched before request methods, when the specification describes that the request methods must be respected before headers are matched. This could result in unexpected behaviour with security This issue is fixed in Cilium v1.15.8 and v1.16.1. There is no workaround for this issue.

CVSS Scores

version 3.1