Access Control Bypass Affecting github.com/cilium/cilium/pkg/bpf package, versions <1.10.13 >=1.11.0 <1.11.7


0.0
low
  • Attack Complexity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMCILIUMCILIUMPKGBPF-2958043

  • published

    26 Jul 2022

  • disclosed

    15 Jul 2022

  • credit

    Paul Chaignon

Introduced: 15 Jul 2022

CWE-284 Open this link in a new tab

How to fix?

Upgrade github.com/cilium/cilium/pkg/bpf to version 1.10.13, 1.11.7 or higher.

Overview

github.com/cilium/cilium/pkg/bpf is an eBPF-based Networking, Security, and Observability

Affected versions of this package are vulnerable to Access Control Bypass when IPv6 traffic is sent from a Cilium-managed pod to the host-network namespace. If IPv4, IPv6, and endpoint routes are in use, and the host firewall is enabled (which it is not by default), host policy enforcement can be bypassed.