Upstream information
Description
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Versions 1.15.0 to 1.15.15, 1.16.0 to 1.16.8, and 1.17.0 to 1.17.2, are vulnerable when using Wireguard transparent encryption in a Cilium cluster, packets that originate from a terminating endpoint can leave the source node without encryption due to a race condition in how traffic is processed by Cilium. This issue has been patched in versions 1.15.16, 1.16.9, and 1.17.3. There are no workarounds available for this issue.SUSE information
Overall state of this security issue: Resolved
This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.
| CVSS detail | CNA (GitHub) | 
|---|---|
| Base Score | 4 | 
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N | 
| Attack Vector | Network | 
| Attack Complexity | High | 
| Privileges Required | None | 
| User Interaction | None | 
| Scope | Changed | 
| Confidentiality Impact | Low | 
| Integrity Impact | None | 
| Availability Impact | None | 
| CVSSv3 Version | 3.1 | 
SUSE Security Advisories:
- openSUSE-SU-2025:15017-1, published Thu Apr 24 18:51:05 2025
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| Container suse/sl-micro/6.1/baremetal-os-container:2.2.1-7.20 Container suse/sl-micro/6.1/base-os-container:2.2.1-5.43 Container suse/sl-micro/6.1/kvm-os-container:2.2.1-5.45 Container suse/sl-micro/6.1/rt-os-container:2.2.1-5.33  |  
  |  |
| SUSE Linux Enterprise Server 16.0 | 
  |  Patchnames:  SUSE Linux Enterprise Server 16.0 GA govulncheck-vulndb-0.0.20250814T182633-160000.1.2  | 
| openSUSE Tumbleweed | 
  |  Patchnames:  openSUSE-Tumbleweed-2025-15017  | 
SUSE Timeline for this CVE
CVE page created: Mon Apr 21 20:01:36 2025CVE page last modified: Sun Nov 2 14:45:51 2025