Bug 1199831 - (CVE-2022-29178) VUL-0: CVE-2022-29178: cilium: incorrect default permissions vulnerability
(CVE-2022-29178)
VUL-0: CVE-2022-29178: cilium: incorrect default permissions vulnerability
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Containers Team
Security Team bot
https://smash.suse.de/issue/332531/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-05-23 12:52 UTC by Hu
Modified: 2022-05-23 15:45 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-05-23 12:52:24 UTC
CVE-2022-29178

Cilium is open source software for providing and securing network connectivity
and loadbalancing between application workloads. Cilium prior to versions
1.9.16, 1.10.11, and 1.11.15 contains an incorrect default permissions
vulnerability. Operating Systems with users belonging to the group ID 1000 can
access the API of Cilium via Unix domain socket available on the host where
Cilium is running. This could allow malicious users to compromise integrity as
well as system availability on that host. The problem has been fixed and the
patch is available in versions 1.9.16, 1.10.11, and 1.11.5. A potential
workaround is to modify Cilium's DaemonSet to run with a certain command, which
can be found in the GitHub Security Advisory for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29178
https://github.com/cilium/cilium/releases/tag/v1.9.16
https://github.com/cilium/cilium/releases/tag/v1.11.5
https://github.com/cilium/cilium/releases/tag/v1.10.11
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29178
https://github.com/cilium/cilium/security/advisories/GHSA-6p8v-8cq8-v2r3