Логотип exploitDog
bind:CVE-2024-52529
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-52529

Количество 3

Количество 3

nvd логотип

CVE-2024-52529

около 1 года назад

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For users with the following configuration: 1. An allow policy that selects a Layer 3 destination and a port range `AND` 2. A Layer 7 allow policy that selects a specific port within the first policy's range the Layer 7 enforcement would not occur for the traffic selected by the Layer 7 policy. This issue only affects users who use Cilium's port range functionality, which was introduced in Cilium v1.16. This issue is patched in PR #35150. This issue affects Cilium v1.16 between v1.16.0 and v1.16.3 inclusive. This issue is patched in Cilium v1.16.4. Users are advised to upgrade. Users with network policies that match the pattern described above can work around the issue by rewriting any policies that use port ranges to individually specify the ports permitted for traffic.

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2024-52529

около 1 года назад

Cilium is a networking, observability, and security solution with an e ...

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-xg58-75qf-9r67

около 1 года назад

Cilium's Layer 7 policy enforcement may not occur in policies with wildcarded port ranges

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-52529

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For users with the following configuration: 1. An allow policy that selects a Layer 3 destination and a port range `AND` 2. A Layer 7 allow policy that selects a specific port within the first policy's range the Layer 7 enforcement would not occur for the traffic selected by the Layer 7 policy. This issue only affects users who use Cilium's port range functionality, which was introduced in Cilium v1.16. This issue is patched in PR #35150. This issue affects Cilium v1.16 between v1.16.0 and v1.16.3 inclusive. This issue is patched in Cilium v1.16.4. Users are advised to upgrade. Users with network policies that match the pattern described above can work around the issue by rewriting any policies that use port ranges to individually specify the ports permitted for traffic.

CVSS3: 5.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-52529

Cilium is a networking, observability, and security solution with an e ...

CVSS3: 5.8
0%
Низкий
около 1 года назад
github логотип
GHSA-xg58-75qf-9r67

Cilium's Layer 7 policy enforcement may not occur in policies with wildcarded port ranges

CVSS3: 5.8
0%
Низкий
около 1 года назад

Уязвимостей на страницу