Improper Handling of Exceptional Conditions Affecting github.com/cilium/cilium/cmd package, versions >=1.13.0 <1.13.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCILIUMCILIUMCMD-3364515
  • published19 Mar 2023
  • disclosed17 Mar 2023
  • creditaanm

Introduced: 17 Mar 2023

CVE-2023-27595  (opens in a new tab)
CWE-755  (opens in a new tab)

How to fix?

Upgrade github.com/cilium/cilium/cmd to version 1.13.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Handling of Exceptional Conditions when Cilium is started. There is a short period when Cilium eBPF programs are not attached to the host. During this period, the host does not implement any of Cilium's feature sets. This can cause disruption to newly established connections during this period due to the lack of Load Balancing or can cause Network Policy bypass due to the lack of Network Policy enforcement during the window. This vulnerability impacts any Cilium-managed endpoints on the node (such as Kubernetes Pods), as well as the host network namespace (including Host Firewall).

CVSS Scores

version 3.1