Access Restriction Bypass Affecting github.com/cilium/cilium/pkg/bpf Open this link in a new tab package, versions >=1.9.0 <1.9.5 >=1.8.3 <1.8.8 >=1.7.8 <1.7.15


0.0
medium
  • Attack Complexity

    High

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGBPF-1296570

  • published

    25 May 2021

  • disclosed

    21 May 2021

  • credit

    Unknown

Introduced: 21 May 2021

CWE-284 Open this link in a new tab

How to fix?

Upgrade github.com/cilium/cilium/pkg/bpf to version 1.9.5, 1.8.8, 1.7.15 or higher.

Overview

github.com/cilium/cilium/pkg/bpf is an eBPF-based Networking, Security, and Observability

Affected versions of this package are vulnerable to Access Restriction Bypass. Under certain conditions, ICMP Echo Request sent to a Cilium endpoint from an actor (either a pod or a cluster host or a remote host) may bypass a network policy which disallows access from the actor to the endpoint, but allows from the endpoint to the actor. This does not apply to UDP and TCP traffic.

References