RHSA-2026:3556

Vulnerability from csaf_redhat - Published: 2026-03-02 16:52 - Updated: 2026-03-05 06:37
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14

Notes

Topic
Red Hat OpenShift Service Mesh 2.6.14 This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh 2.6.14, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application. Security Fix(es): * proxyv2-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121) * proxyv2-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732) * proxyv2-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731) * proxyv2-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * proxyv2-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Red Hat OpenShift Service Mesh 2.6.14\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift Service Mesh 2.6.14, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application.\n\nSecurity Fix(es):\n\n* proxyv2-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)\n\n* proxyv2-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)\n\n* proxyv2-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)\n\n* proxyv2-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* proxyv2-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:3556",
        "url": "https://access.redhat.com/errata/RHSA-2026:3556"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
        "url": "https://access.redhat.com/security/cve/CVE-2025-61726"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-61728",
        "url": "https://access.redhat.com/security/cve/CVE-2025-61728"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-61731",
        "url": "https://access.redhat.com/security/cve/CVE-2025-61731"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-61732",
        "url": "https://access.redhat.com/security/cve/CVE-2025-61732"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
        "url": "https://access.redhat.com/security/cve/CVE-2025-68121"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-61726",
        "url": "https://access.redhat.com/security/cve/cve-2025-61726"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-61728",
        "url": "https://access.redhat.com/security/cve/cve-2025-61728"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-61731",
        "url": "https://access.redhat.com/security/cve/cve-2025-61731"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-61732",
        "url": "https://access.redhat.com/security/cve/cve-2025-61732"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-68121",
        "url": "https://access.redhat.com/security/cve/cve-2025-68121"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification",
        "url": "https://access.redhat.com/security/updates/classification"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3556.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14",
    "tracking": {
      "current_release_date": "2026-03-05T06:37:10+00:00",
      "generator": {
        "date": "2026-03-05T06:37:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.2"
        }
      },
      "id": "RHSA-2026:3556",
      "initial_release_date": "2026-03-02T16:52:33+00:00",
      "revision_history": [
        {
          "date": "2026-03-02T16:52:33+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-03-02T16:53:16+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-03-05T06:37:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Service Mesh 2.6",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh 2.6",
                  "product_id": "Red Hat OpenShift Service Mesh 2.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:service_mesh:2.6::el9"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Service Mesh"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/istio-must-gather-rhel9@sha256%3A53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/proxyv2-rhel9@sha256%3Af49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/istio-must-gather-rhel9@sha256%3A25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/proxyv2-rhel9@sha256%3Aefd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
                  "product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/istio-must-gather-rhel9@sha256%3Aa168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
                  "product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/proxyv2-rhel9@sha256%3A14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
                  "product_id": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/istio-must-gather-rhel9@sha256%3A94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1771958430"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
                  "product_id": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/proxyv2-rhel9@sha256%3A47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1772083861"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-61726",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2026-01-28T20:01:42.791305+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2434432"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "RHBZ#2434432",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/736712",
          "url": "https://go.dev/cl/736712"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77101",
          "url": "https://go.dev/issue/77101"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
          "url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4341",
          "url": "https://pkg.go.dev/vuln/GO-2026-4341"
        }
      ],
      "release_date": "2026-01-28T19:30:31.215000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-02T16:52:33+00:00",
          "details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:3556"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
    },
    {
      "cve": "CVE-2025-61728",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2026-01-28T20:01:39.965024+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2434431"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the archive/zip package in the Go standard library. A super-linear file name indexing algorithm is used in the first time a file in an archive is opened. A crafted zip archive containing a specific arrangement of file names can cause an excessive CPU and memory consumption. A Go application processing a malicious archive can become unresponsive or crash, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To exploit this flaw, an attacker needs to be able to process a malicious zip archive with an application using the archive/zip package. Additionally, this vulnerability can cause a Go application to consume an excessive amount of CPU and memory, eventually resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-61728"
        },
        {
          "category": "external",
          "summary": "RHBZ#2434431",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434431"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-61728",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61728"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/736713",
          "url": "https://go.dev/cl/736713"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77102",
          "url": "https://go.dev/issue/77102"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
          "url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4342",
          "url": "https://pkg.go.dev/vuln/GO-2026-4342"
        }
      ],
      "release_date": "2026-01-28T19:30:31.354000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-02T16:52:33+00:00",
          "details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:3556"
        },
        {
          "category": "workaround",
          "details": "To mitigate this vulnerability, implement a timeout in your archive/zip processing logic to abort the operation if it exceeds a few seconds, preventing the application from consuming an excessive amount of resources.",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip"
    },
    {
      "cve": "CVE-2025-61731",
      "cwe": {
        "id": "CWE-88",
        "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
      },
      "discovery_date": "2026-01-28T20:01:45.587773+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2434433"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in cmd/go. An attacker can exploit this by building a malicious Go source file that uses the \u0027#cgo pkg-config:\u0027 directive. This allows the attacker to write to an arbitrary file with partial control over its content, by providing a \u0027--log-file\u0027 argument to the pkg-config command. This vulnerability can lead to arbitrary file write.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is Important rather than Moderate because compiling a malicious Go source file can cause `pkg-config` to create or append data to files at attacker-chosen locations, subject to the permissions of the build user. This can enable unintended filesystem modifications during the build process, which can lead to broken builds, alter tool behavior, and poison caches or artifacts, even without direct code execution.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-61731"
        },
        {
          "category": "external",
          "summary": "RHBZ#2434433",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434433"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-61731",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61731",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61731"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/736711",
          "url": "https://go.dev/cl/736711"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77100",
          "url": "https://go.dev/issue/77100"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
          "url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4339",
          "url": "https://pkg.go.dev/vuln/GO-2026-4339"
        }
      ],
      "release_date": "2026-01-28T19:30:30.844000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-02T16:52:33+00:00",
          "details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:3556"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive"
    },
    {
      "cve": "CVE-2025-61732",
      "discovery_date": "2026-02-05T05:00:47.678207+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2437016"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-61732"
        },
        {
          "category": "external",
          "summary": "RHBZ#2437016",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/734220",
          "url": "https://go.dev/cl/734220"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/76697",
          "url": "https://go.dev/issue/76697"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
          "url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4433",
          "url": "https://pkg.go.dev/vuln/GO-2026-4433"
        }
      ],
      "release_date": "2026-02-05T03:42:26.392000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-02T16:52:33+00:00",
          "details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:3556"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
    },
    {
      "cve": "CVE-2025-68121",
      "discovery_date": "2026-02-05T18:01:30.086058+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2437111"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "crypto/tls: Unexpected session resumption in crypto/tls",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "RHBZ#2437111",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/737700",
          "url": "https://go.dev/cl/737700"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77217",
          "url": "https://go.dev/issue/77217"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
          "url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4337",
          "url": "https://pkg.go.dev/vuln/GO-2026-4337"
        }
      ],
      "release_date": "2026-02-05T17:48:44.141000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-02T16:52:33+00:00",
          "details": "See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:3556"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:25c1cd1facbe56ad4974d8c66a6bfb64cf982d244ff22e857a0333a39ea818e0_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:53ad217917241b2a4b87cb81e54cb4f2618cede3c20613acec84939a639a4514_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:94e7ae70d26390f684b96b620f2f0d4375e6a447885ba481454a760f14f4d77e_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:a168ca48217a77eb0f770779e33d5d71a313efb3cb06d01eb4050e5d04a47864_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:14dcee73384f17ebe545788b8cf1dceec3492ddd77d6b82157dbc5076cfaaa91_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:47cab522c64f29015b2b675db01ddb8311f1f86633a6172f5bdb5236ddc71110_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:efd2df1b504c10b74f5960eab43edd126f36ae4adccbc61c881e08e64c758e2d_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/proxyv2-rhel9@sha256:f49b0ec7e087153e981b53d90a1eb32155f703c59c0e3ba9cd1427dd3defcf7d_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "crypto/tls: Unexpected session resumption in crypto/tls"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…