Access Restriction Bypass Affecting github.com/cilium/cilium/pkg/bpf Open this link in a new tab package, versions >=1.9.0 <1.9.5 >=1.8.3 <1.8.8 >=1.7.8 <1.7.15
Attack Complexity
High
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGBPF-1296570
-
published
25 May 2021
-
disclosed
21 May 2021
-
credit
Unknown
Introduced: 21 May 2021
CWE-284 Open this link in a new tabHow to fix?
Upgrade github.com/cilium/cilium/pkg/bpf
to version 1.9.5, 1.8.8, 1.7.15 or higher.
Overview
github.com/cilium/cilium/pkg/bpf is an eBPF-based Networking, Security, and Observability
Affected versions of this package are vulnerable to Access Restriction Bypass. Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor (either a pod or a cluster host or a remote host) may bypass a network policy which disallows access from the actor to the endpoint, but allows from the endpoint to the actor. This does not apply to UDP and TCP traffic.