Access Restriction Bypass Affecting github.com/cilium/cilium/pkg/bpf package, versions >=1.9.0 <1.9.5 >=1.8.3 <1.8.8 >=1.7.8 <1.7.15


0.0
medium

Snyk CVSS

    Attack Complexity High
    Confidentiality High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGBPF-1296570
  • published 25 May 2021
  • disclosed 21 May 2021
  • credit Unknown

How to fix?

Upgrade github.com/cilium/cilium/pkg/bpf to version 1.9.5, 1.8.8, 1.7.15 or higher.

Overview

github.com/cilium/cilium/pkg/bpf is an eBPF-based Networking, Security, and Observability

Affected versions of this package are vulnerable to Access Restriction Bypass. Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor (either a pod or a cluster host or a remote host) may bypass a network policy which disallows access from the actor to the endpoint, but allows from the endpoint to the actor. This does not apply to UDP and TCP traffic.

References