Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module github.com/cilium/cilium to v1.15.13 [security] (v1.1) #3326

Merged

Conversation

cilium-renovate[bot]
Copy link
Contributor

@cilium-renovate cilium-renovate bot commented Jan 23, 2025

This PR contains the following updates:

Package Type Update Change
github.com/cilium/cilium require patch v1.15.10 -> v1.15.13

DoS in Cilium agent DNS proxy from crafted DNS responses

BIT-cilium-2025-23028 / BIT-cilium-operator-2025-23028 / BIT-hubble-relay-2025-23028 / CVE-2025-23028 / GHSA-9m5p-c77c-f9j7

More information

Details

Impact

In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster.

For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart.

Patches

This issue affects:

  • Cilium v1.14 between v1.14.0 and v1.14.17 inclusive
  • Cilium v1.15 between v1.15.0 and v1.15.11 inclusive
  • Cilium v1.16 between v1.16.0 and v1.16.4 inclusive

This issue is fixed in:

  • Cilium v1.14.18
  • Cilium v1.15.12
  • Cilium v1.16.5
Workarounds

There are no known workarounds to this issue.

Acknowledgements

The Cilium community has worked together with members of Isovalent and the Cisco Advanced Security Initiatives Group (ASIG) to prepare these mitigations. Special thanks to @​kokelley-cisco for reporting this issue and @​bimmlerd for the fix.

For more information

If you have any questions or comments about this advisory, please reach out on Slack.

If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [email protected]. This is a private mailing list for the Cilium security team, and your report will be treated as top priority.

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Cilium has an information leakage via insecure default Hubble UI CORS header

BIT-cilium-2025-23047 / BIT-cilium-operator-2025-23047 / BIT-hubble-relay-2025-23047 / CVE-2025-23047 / GHSA-h78m-j95m-5356

More information

Details

Impact

For users who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart, an insecure default Access-Control-Allow-Origin header value could lead to sensitive data exposure. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page.

Patches

This issue was patched in cilium/cilium@a3489f1

This issue affects:

  • Cilium between v1.14.0 and v1.14.18 inclusive
  • Cilium between v1.15.0 and v1.15.12 inclusive
  • Cilium between v1.16.0 and v1.16.5 inclusive

This issue is patched in:

  • Cilium v1.14.19
  • Cilium v1.15.13
  • Cilium v1.16.6
Workarounds

Users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch.

Acknowledgements

The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @​ciffelia for reporting this issue and to @​geakstr for the fix.

For more information

If you have any questions or comments about this advisory, please reach out on Slack.

If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [email protected]. This is a private mailing list for the Cilium security team, and your report will be treated as top priority.

Severity

  • CVSS Score: 6.5 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

cilium/cilium (github.com/cilium/cilium)

v1.15.13: 1.15.13

Compare Source

Summary of Changes

Major Changes:

Minor Changes:

Bugfixes:

CI Changes:

Misc Changes:

Other Changes:

Docker Manifests
cilium

quay.io/cilium/cilium:v1.15.13@​sha256:61d27c5adda269e4d4dffbc3fa619590c2c601bb23e62255d14515c8d6aed9a6

clustermesh-apiserver

quay.io/cilium/clustermesh-apiserver:v1.15.13@​sha256:e5c925b5109ae93a5eca521acc2a225c1a2ea516a6502ff2a51d1a724b68681d

docker-plugin

quay.io/cilium/docker-plugin:v1.15.13@​sha256:5b242fab9f4a6b6ed3eff3729c8b4974bf997c0446f72a155d8ae593d864c4bc

hubble-relay

quay.io/cilium/hubble-relay:v1.15.13@​sha256:68456e4b0dd3181000af51d89c0664c8b08e8c55d0d8d9ff949efea2a84bdf11

operator-alibabacloud

quay.io/cilium/operator-alibabacloud:v1.15.13@​sha256:360c5d0a26498606fece10cc67fdac859f963934611d17ab0bb3c5fa30b4223e

operator-aws

quay.io/cilium/operator-aws:v1.15.13@​sha256:cca2e5133c4f257cef10f0ad63d0ed5632b7ad556e311b1ae39574eb351b7fe3

operator-azure

quay.io/cilium/operator-azure:v1.15.13@​sha256:9c2f0898a19887c8f043f4742b40ac9b3496934f2c90442b42abf8bb47c26ed8

operator-generic

quay.io/cilium/operator-generic:v1.15.13@​sha256:7ee922f169575ae201cb39c89973f931ce2306df792b8850ab9e3591b9d704a8

operator

quay.io/cilium/operator:v1.15.13@​sha256:9ef72a85e70d87397cf1e5cd1daffdb972960783bfe6cb6d5e6546fc908f2f2e

v1.15.12: 1.15.12

Compare Source

Summary of Changes

Bugfixes:

CI Changes:

Misc Changes:

Other Changes:

Docker Manifests
cilium

quay.io/cilium/cilium:v1.15.12@​sha256:d1793b67d976e1bc0a4ab01b34c94adfcd35a8be7612d04c6d618bf25f50f0d1

clustermesh-apiserver

quay.io/cilium/clustermesh-apiserver:v1.15.12@​sha256:96541f82229725e21b036adffffd92270c82b4bc0f8c27795058b5f115ad5bd0

docker-plugin

quay.io/cilium/docker-plugin:v1.15.12@​sha256:f564af976d82c09e37f17945e7de9bfc17f76a7f0f4d5529795c22d3fffd2adb

hubble-relay

quay.io/cilium/hubble-relay:v1.15.12@​sha256:19a6458a8ea824052fe74ff06f37222f42e72df41f06b548fe07b9a22daa1203

operator-alibabacloud

quay.io/cilium/operator-alibabacloud:v1.15.12@​sha256:f62872cb96278159e968e3f384ad2ebab30eef9335c2a3838c5bc0bc528398ce

operator-aws

quay.io/cilium/operator-aws:v1.15.12@​sha256:a9d63cbd89e0c7ccf46460809b95e37045092dd297a1bc934afa19a83f4884aa

operator-azure

quay.io/cilium/operator-azure:v1.15.12@​sha256:a89046318bbb87f9ae357566dab448871384cfc7797ef2a3c31abd903d9ec8dc

operator-generic

quay.io/cilium/operator-generic:v1.15.12@​sha256:e48d863367bfd39843917400aa7454ca6a4af74f995cf29a2edb81d7d13c7277

operator

quay.io/cilium/operator:v1.15.12@​sha256:3c40d1c94de94629c02c2c8ee8b69ee6e16c9e60e94ecd343e2a48ebf4a6c430

v1.15.11: 1.15.11

Compare Source

Summary of Changes

Minor Changes:

Bugfixes:

CI Changes:

Misc Changes:

Other Changes:

Docker Manifests
cilium

quay.io/cilium/cilium:v1.15.11@​sha256:4444c963c586dd29c9219f4f984b87b7d6f7ee5c0ce650b442111a6ab602b00f

clustermesh-apiserver

quay.io/cilium/clustermesh-apiserver:v1.15.11@​sha256:62a4aa3467fa94de65cc01bbbac97484edeee14f7510af7e096b51ab79a6ff71

docker-plugin

quay.io/cilium/docker-plugin:v1.15.11@​sha256:3a9c057f13d9447732ac12373286d23acab5024ce39ce9797ce3b05df43a53ff

hubble-relay

quay.io/cilium/hubble-relay:v1.15.11@​sha256:d352d3860707e8d734a0b185ff69e30b3ffd630a7ec06ba6a4402bed64b4456c

operator-alibabacloud

quay.io/cilium/operator-alibabacloud:v1.15.11@​sha256:62d67aafbfdc9faa4af1c7a1cae39ae61cf151da414670d317c7e2d60820b3de

operator-aws

quay.io/cilium/operator-aws:v1.15.11@​sha256:88088886ab884441c190211d25cae9056f2f4a26e9dcb857c020324062831ab6

operator-azure

quay.io/cilium/operator-azure:v1.15.11@​sha256:b80f4239af8617fa5ea131cedf5c2d3e3375b91916f69e348993a535f7c1fbc3

operator-generic

quay.io/cilium/operator-generic:v1.15.11@​sha256:8edf16ce4bc5c02457136cf0e7a58adf396f0880d6192ca0666f116f53f4979d

operator

quay.io/cilium/operator:v1.15.11@​sha256:945b54e27f3216e35e30b66d653de0517426e14a4e9200fd10cb73f5852e1b4a


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@cilium-renovate cilium-renovate bot requested a review from a team as a code owner January 23, 2025 09:17
@cilium-renovate cilium-renovate bot added release-blocker This PR or issue is blocking the next release. release-note/dependency This PR updates one or multiple dependencies labels Jan 23, 2025
@cilium-renovate cilium-renovate bot requested review from jrfastab and removed request for a team January 23, 2025 09:17
Signed-off-by: cilium-renovate[bot] <134692979+cilium-renovate[bot]@users.noreply.github.com>
@cilium-renovate cilium-renovate bot force-pushed the renovate/v1.1-go-github.com-cilium-cilium-vulnerability branch from 8548b39 to ecaa8d0 Compare January 28, 2025 11:20
@mtardy mtardy merged commit 89a643d into v1.1 Jan 28, 2025
37 checks passed
@mtardy mtardy deleted the renovate/v1.1-go-github.com-cilium-cilium-vulnerability branch January 28, 2025 14:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release-blocker This PR or issue is blocking the next release. release-note/dependency This PR updates one or multiple dependencies
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant