• 公告ID (KylinSec-SA-2025-2386)

摘要:

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. For Cilium users who use Gateway API for Ingress for some services and use LB-IPAM or BGP for LB Service implementation and use network policies to block egress traffic from workloads in a namespace to workloads in other namespaces, egress traffic from workloads covered by such network policies to LoadBalancers configured by `Gateway` resources will incorrectly be allowed. LoadBalancer resources not deployed via a Gateway API configuration are not affected by this issue. This issue affects: Cilium v1.15 between v1.15.0 and v1.15.14 inclusive, v1.16 between v1.16.0 and v1.16.7 inclusive, and v1.17 between v1.17.0 and v1.17.1 inclusive. This issue is fixed in Cilium v1.15.15, v1.16.8, and v1.17.2. A Clusterwide Cilium Network Policy can be used to work around this issue for users who are unable to upgrade.

安全等级: Low

公告ID: KylinSec-SA-2025-2386

发布日期: 2025年4月28日

关联CVE: CVE-2025-30162  

  • 详细介绍

1. 漏洞描述

   

Cilium是一款基于eBPF的数据平面解决方案,提供网络、可观测性和安全功能。对于同时满足以下条件的Cilium用户:使用Gateway API为部分服务配置Ingress、使用LB-IPAM或BGP实现LB Service、并配置了网络策略以阻止工作负载跨命名空间的出口流量,存在一个安全问题:此类网络策略会错误地允许受管控工作负载访问通过Gateway资源配置的LoadBalancer的出口流量。未通过Gateway API配置的LoadBalancer资源不受此问题影响。

受影响版本包括:

Cilium v1.15.0至v1.15.14(含)
v1.16.0至v1.16.7(含)
v1.17.0至v1.17.1(含)

该问题已在以下版本中修复:

v1.15.15
v1.16.8
v1.17.2

无法升级的用户可以通过配置Clusterwide Cilium Network Policy来规避此问题。

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2025-30162 KY3.4-5A cilium Unaffected
CVE-2025-30162 V6 cilium Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2025-2385 下一篇:KylinSec-SA-2025-2387