VYPR
Moderate severityNVD Advisory· Published May 5, 2025· Updated May 19, 2025

CVE-2025-43915

CVE-2025-43915

Description

In Linkerd edge releases before edge-25.2.1, and Buoyant Enterprise for Linkerd releases 2.13.0–2.13.7, 2.14.0–2.14.10, 2.15.0–2.15.7, 2.16.0–2.16.4, and 2.17.0–2.17.1, resource exhaustion can occur for Linkerd proxy metrics.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linkerd proxy metrics in certain edge and Buoyant Enterprise releases allow resource exhaustion via high-cardinality hostname labels.

Vulnerability

Description

Linkerd proxies track HTTP request metrics using labels such as authority for inbound requests and hostname for outbound requests. In affected versions, these metrics are exposed without any cardinality limits. An attacker can craft HTTP requests with a large number of unique hostnames, causing the proxy to generate an unbounded number of metric series [1][3]. This results in high memory consumption on the proxy itself and can overwhelm downstream metrics ingestion systems, including third-party platforms [3].

Attack

Vector

The vulnerability can be exploited by any client that can send HTTP requests to a meshed Linkerd proxy. Common attack scenarios include a Linkerd deployment exposed to the internet—for example, through a meshed ingress controller—or a mesh that handles traffic from uncontrolled third-party applications. Additionally, if a Linkerd deployment has egress metrics enabled and meshes arbitrary third-party applications, an attacker can also trigger the exhaustion via outbound requests [3]. No special authentication or network position beyond the ability to send HTTP requests is required.

Impact

A successful exploitation leads to resource exhaustion on the Linkerd proxy, consuming increasing amounts of memory over time. This can degrade or deny service to legitimate traffic. The surge in metric cardinality can also overload Prometheus or other monitoring backends, potentially causing data loss or increased operational costs for third-party metrics ingestion services [3].

Mitigation and

Patches

The issue is fixed in Linkerd edge release edge-25.2.1 and later. For stable and Buoyant Enterprise releases, the fix is included in versions following those listed: users of affected releases should upgrade promptly [3]. As a workaround, operators should ensure that Linkerd proxies are not exposed to HTTP requests with unbounded hostnames—for example, by filtering or rate-limiting incoming requests at the ingress level [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/linkerd/linkerd2Go
< 0.0.0-20250212165942-faa3f617eef50.0.0-20250212165942-faa3f617eef5

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.