Vulnerability from bitnami_vulndb
Published
2024-08-17 07:16
Modified
2025-05-20 10:02
Summary
Cilium agent's race condition may lead to policy bypass for Host Firewall policy
Details
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.14.14 and 1.15.8, a race condition in the Cilium agent can cause the agent to ignore labels that should be applied to a node. This could in turn cause CiliumClusterwideNetworkPolicies intended for nodes with the ignored label to not apply, leading to policy bypass. This issue has been patched in Cilium v1.14.14 and v1.15.8 As the underlying issue depends on a race condition, users unable to upgrade can restart the Cilium agent on affected nodes until the affected policies are confirmed to be working as expected.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "cilium",
"purl": "pkg:bitnami/cilium"
},
"ranges": [
{
"events": [
{
"introduced": "1.15.4"
},
{
"fixed": "1.16.0"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2024-42488"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:cilium:cilium:*:*:*:*:*:go:*:*"
],
"severity": "Medium"
},
"details": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.14.14 and 1.15.8, a race condition in the Cilium agent can cause the agent to ignore labels that should be applied to a node. This could in turn cause CiliumClusterwideNetworkPolicies intended for nodes with the ignored label to not apply, leading to policy bypass. This issue has been patched in Cilium v1.14.14 and v1.15.8 As the underlying issue depends on a race condition, users unable to upgrade can restart the Cilium agent on affected nodes until the affected policies are confirmed to be working as expected.",
"id": "BIT-cilium-2024-42488",
"modified": "2025-05-20T10:02:07.006Z",
"published": "2024-08-17T07:16:31.051Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/cilium/cilium/commit/aa44dd148a9be95e07782e4f990e61678ef0abf8"
},
{
"type": "WEB",
"url": "https://github.com/cilium/cilium/pull/33511"
},
{
"type": "WEB",
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-q7w8-72mr-vpgw"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42488"
}
],
"schema_version": "1.5.0",
"summary": "Cilium agent\u0027s race condition may lead to policy bypass for Host Firewall policy"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…