Access Restriction Bypass Affecting github.com/cilium/cilium/pkg/bpf package, versions >=1.9.0 <1.9.5 >=1.8.3 <1.8.8 >=1.7.8 <1.7.15
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGBPF-1296570
- published 25 May 2021
- disclosed 21 May 2021
- credit Unknown
How to fix?
Upgrade github.com/cilium/cilium/pkg/bpf
to version 1.9.5, 1.8.8, 1.7.15 or higher.
Overview
github.com/cilium/cilium/pkg/bpf is an eBPF-based Networking, Security, and Observability
Affected versions of this package are vulnerable to Access Restriction Bypass. Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor (either a pod or a cluster host or a remote host) may bypass a network policy which disallows access from the actor to the endpoint, but allows from the endpoint to the actor. This does not apply to UDP and TCP traffic.