CVE-2022-29179

Cilium is open source software for providing and securing network connectivity and loadbalancing between application workloads. Prior to versions 1.9.16, 1.10.11, and 1.11.15, if an attacker is able to perform a container escape of a container running as root on a host where Cilium is installed, the attacker can escalate privileges to cluster admin by using Cilium's Kubernetes service account. The problem has been fixed and the patch is available in versions 1.9.16, 1.10.11, and 1.11.5. There are no known workarounds available.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*
cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*
cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:58

Type Values Removed Values Added
References () https://github.com/cilium/cilium/releases/tag/v1.10.11 - Release Notes, Third Party Advisory () https://github.com/cilium/cilium/releases/tag/v1.10.11 - Release Notes, Third Party Advisory
References () https://github.com/cilium/cilium/releases/tag/v1.11.5 - Release Notes, Third Party Advisory () https://github.com/cilium/cilium/releases/tag/v1.11.5 - Release Notes, Third Party Advisory
References () https://github.com/cilium/cilium/releases/tag/v1.9.16 - Release Notes, Third Party Advisory () https://github.com/cilium/cilium/releases/tag/v1.9.16 - Release Notes, Third Party Advisory
References () https://github.com/cilium/cilium/security/advisories/GHSA-fmrf-gvjp-5j5g - Third Party Advisory () https://github.com/cilium/cilium/security/advisories/GHSA-fmrf-gvjp-5j5g - Third Party Advisory
CVSS v2 : 7.2
v3 : 8.2
v2 : 7.2
v3 : 7.5

Information

Published : 2022-05-20 19:15

Updated : 2024-11-21 06:58


NVD link : CVE-2022-29179

Mitre link : CVE-2022-29179

CVE.ORG link : CVE-2022-29179


JSON object : View

Products Affected

cilium

  • cilium
CWE
CWE-269

Improper Privilege Management