CVE-2025-43915
Description
In Linkerd edge releases before edge-25.2.1, and Buoyant Enterprise for Linkerd releases 2.13.0–2.13.7, 2.14.0–2.14.10, 2.15.0–2.15.7, 2.16.0–2.16.4, and 2.17.0–2.17.1, resource exhaustion can occur for Linkerd proxy metrics.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linkerd proxy metrics in certain edge and Buoyant Enterprise releases allow resource exhaustion via high-cardinality hostname labels.
Vulnerability
Description
Linkerd proxies track HTTP request metrics using labels such as authority for inbound requests and hostname for outbound requests. In affected versions, these metrics are exposed without any cardinality limits. An attacker can craft HTTP requests with a large number of unique hostnames, causing the proxy to generate an unbounded number of metric series [1][3]. This results in high memory consumption on the proxy itself and can overwhelm downstream metrics ingestion systems, including third-party platforms [3].
Attack
Vector
The vulnerability can be exploited by any client that can send HTTP requests to a meshed Linkerd proxy. Common attack scenarios include a Linkerd deployment exposed to the internet—for example, through a meshed ingress controller—or a mesh that handles traffic from uncontrolled third-party applications. Additionally, if a Linkerd deployment has egress metrics enabled and meshes arbitrary third-party applications, an attacker can also trigger the exhaustion via outbound requests [3]. No special authentication or network position beyond the ability to send HTTP requests is required.
Impact
A successful exploitation leads to resource exhaustion on the Linkerd proxy, consuming increasing amounts of memory over time. This can degrade or deny service to legitimate traffic. The surge in metric cardinality can also overload Prometheus or other monitoring backends, potentially causing data loss or increased operational costs for third-party metrics ingestion services [3].
Mitigation and
Patches
The issue is fixed in Linkerd edge release edge-25.2.1 and later. For stable and Buoyant Enterprise releases, the fix is included in versions following those listed: users of affected releases should upgrade promptly [3]. As a workaround, operators should ensure that Linkerd proxies are not exposed to HTTP requests with unbounded hostnames—for example, by filtering or rate-limiting incoming requests at the ingress level [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/linkerd/linkerd2Go | < 0.0.0-20250212165942-faa3f617eef5 | 0.0.0-20250212165942-faa3f617eef5 |
Affected products
3- Linkerd/Linkerddescription
- Range: 2.13.0-2.13.7, 2.14.0-2.14.10, 2.15.0-2.15.7, 2.16.0-2.16.4, 2.17.0-2.17.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.