fix(deps): update module github.com/cilium/cilium to v1.15.13 [security] (v1.1) #3326
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.15.10
->v1.15.13
DoS in Cilium agent DNS proxy from crafted DNS responses
BIT-cilium-2025-23028 / BIT-cilium-operator-2025-23028 / BIT-hubble-relay-2025-23028 / CVE-2025-23028 / GHSA-9m5p-c77c-f9j7
More information
Details
Impact
In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster.
For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart.
Patches
This issue affects:
This issue is fixed in:
Workarounds
There are no known workarounds to this issue.
Acknowledgements
The Cilium community has worked together with members of Isovalent and the Cisco Advanced Security Initiatives Group (ASIG) to prepare these mitigations. Special thanks to @kokelley-cisco for reporting this issue and @bimmlerd for the fix.
For more information
If you have any questions or comments about this advisory, please reach out on Slack.
If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [email protected]. This is a private mailing list for the Cilium security team, and your report will be treated as top priority.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Cilium has an information leakage via insecure default Hubble UI CORS header
BIT-cilium-2025-23047 / BIT-cilium-operator-2025-23047 / BIT-hubble-relay-2025-23047 / CVE-2025-23047 / GHSA-h78m-j95m-5356
More information
Details
Impact
For users who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart, an insecure default
Access-Control-Allow-Origin
header value could lead to sensitive data exposure. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page.Patches
This issue was patched in cilium/cilium@a3489f1
This issue affects:
This issue is patched in:
Workarounds
Users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch.
Acknowledgements
The Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @ciffelia for reporting this issue and to @geakstr for the fix.
For more information
If you have any questions or comments about this advisory, please reach out on Slack.
If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [email protected]. This is a private mailing list for the Cilium security team, and your report will be treated as top priority.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
cilium/cilium (github.com/cilium/cilium)
v1.15.13
: 1.15.13Compare Source
Summary of Changes
Major Changes:
Minor Changes:
Bugfixes:
CI Changes:
Misc Changes:
1a6e657
(v1.15) (#36614, @cilium-renovate[bot])make -C Documentation update-cmdref
when make uses--jobserver-style=fifo
. (Backport PR #36871, Upstream PR #36788, @gentoo-root)Other Changes:
Docker Manifests
cilium
quay.io/cilium/cilium:v1.15.13@​sha256:61d27c5adda269e4d4dffbc3fa619590c2c601bb23e62255d14515c8d6aed9a6
clustermesh-apiserver
quay.io/cilium/clustermesh-apiserver:v1.15.13@​sha256:e5c925b5109ae93a5eca521acc2a225c1a2ea516a6502ff2a51d1a724b68681d
docker-plugin
quay.io/cilium/docker-plugin:v1.15.13@​sha256:5b242fab9f4a6b6ed3eff3729c8b4974bf997c0446f72a155d8ae593d864c4bc
hubble-relay
quay.io/cilium/hubble-relay:v1.15.13@​sha256:68456e4b0dd3181000af51d89c0664c8b08e8c55d0d8d9ff949efea2a84bdf11
operator-alibabacloud
quay.io/cilium/operator-alibabacloud:v1.15.13@​sha256:360c5d0a26498606fece10cc67fdac859f963934611d17ab0bb3c5fa30b4223e
operator-aws
quay.io/cilium/operator-aws:v1.15.13@​sha256:cca2e5133c4f257cef10f0ad63d0ed5632b7ad556e311b1ae39574eb351b7fe3
operator-azure
quay.io/cilium/operator-azure:v1.15.13@​sha256:9c2f0898a19887c8f043f4742b40ac9b3496934f2c90442b42abf8bb47c26ed8
operator-generic
quay.io/cilium/operator-generic:v1.15.13@​sha256:7ee922f169575ae201cb39c89973f931ce2306df792b8850ab9e3591b9d704a8
operator
quay.io/cilium/operator:v1.15.13@​sha256:9ef72a85e70d87397cf1e5cd1daffdb972960783bfe6cb6d5e6546fc908f2f2e
v1.15.12
: 1.15.12Compare Source
Summary of Changes
Bugfixes:
CI Changes:
Misc Changes:
147f428
(v1.15) (#36223, @cilium-renovate[bot])Other Changes:
Docker Manifests
cilium
quay.io/cilium/cilium:v1.15.12@​sha256:d1793b67d976e1bc0a4ab01b34c94adfcd35a8be7612d04c6d618bf25f50f0d1
clustermesh-apiserver
quay.io/cilium/clustermesh-apiserver:v1.15.12@​sha256:96541f82229725e21b036adffffd92270c82b4bc0f8c27795058b5f115ad5bd0
docker-plugin
quay.io/cilium/docker-plugin:v1.15.12@​sha256:f564af976d82c09e37f17945e7de9bfc17f76a7f0f4d5529795c22d3fffd2adb
hubble-relay
quay.io/cilium/hubble-relay:v1.15.12@​sha256:19a6458a8ea824052fe74ff06f37222f42e72df41f06b548fe07b9a22daa1203
operator-alibabacloud
quay.io/cilium/operator-alibabacloud:v1.15.12@​sha256:f62872cb96278159e968e3f384ad2ebab30eef9335c2a3838c5bc0bc528398ce
operator-aws
quay.io/cilium/operator-aws:v1.15.12@​sha256:a9d63cbd89e0c7ccf46460809b95e37045092dd297a1bc934afa19a83f4884aa
operator-azure
quay.io/cilium/operator-azure:v1.15.12@​sha256:a89046318bbb87f9ae357566dab448871384cfc7797ef2a3c31abd903d9ec8dc
operator-generic
quay.io/cilium/operator-generic:v1.15.12@​sha256:e48d863367bfd39843917400aa7454ca6a4af74f995cf29a2edb81d7d13c7277
operator
quay.io/cilium/operator:v1.15.12@​sha256:3c40d1c94de94629c02c2c8ee8b69ee6e16c9e60e94ecd343e2a48ebf4a6c430
v1.15.11
: 1.15.11Compare Source
Summary of Changes
Minor Changes:
Bugfixes:
CI Changes:
Misc Changes:
0ca97f4
(v1.15) (#35443, @cilium-renovate[bot])b274ff1
(v1.15) (#35383, @cilium-renovate[bot])Other Changes:
Docker Manifests
cilium
quay.io/cilium/cilium:v1.15.11@​sha256:4444c963c586dd29c9219f4f984b87b7d6f7ee5c0ce650b442111a6ab602b00f
clustermesh-apiserver
quay.io/cilium/clustermesh-apiserver:v1.15.11@​sha256:62a4aa3467fa94de65cc01bbbac97484edeee14f7510af7e096b51ab79a6ff71
docker-plugin
quay.io/cilium/docker-plugin:v1.15.11@​sha256:3a9c057f13d9447732ac12373286d23acab5024ce39ce9797ce3b05df43a53ff
hubble-relay
quay.io/cilium/hubble-relay:v1.15.11@​sha256:d352d3860707e8d734a0b185ff69e30b3ffd630a7ec06ba6a4402bed64b4456c
operator-alibabacloud
quay.io/cilium/operator-alibabacloud:v1.15.11@​sha256:62d67aafbfdc9faa4af1c7a1cae39ae61cf151da414670d317c7e2d60820b3de
operator-aws
quay.io/cilium/operator-aws:v1.15.11@​sha256:88088886ab884441c190211d25cae9056f2f4a26e9dcb857c020324062831ab6
operator-azure
quay.io/cilium/operator-azure:v1.15.11@​sha256:b80f4239af8617fa5ea131cedf5c2d3e3375b91916f69e348993a535f7c1fbc3
operator-generic
quay.io/cilium/operator-generic:v1.15.11@​sha256:8edf16ce4bc5c02457136cf0e7a58adf396f0880d6192ca0666f116f53f4979d
operator
quay.io/cilium/operator:v1.15.11@​sha256:945b54e27f3216e35e30b66d653de0517426e14a4e9200fd10cb73f5852e1b4a
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.