RHSA-2026:5132

Vulnerability from csaf_redhat - Published: 2026-03-19 14:09 - Updated: 2026-03-22 13:45
Summary
Red Hat Security Advisory: Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6
Severity
Important
Notes
Topic: Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6 This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Kiali 1.73.28, for Red Hat OpenShift Service Mesh 2.6, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently. Security Fix(es): * kiali-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * kiali-rhel8: Rollup: Remote Code Execution via Path Traversal Vulnerability (CVE-2026-27606) * kiali-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.

CWE-770 - Allocation of Resources Without Limits or Throttling
Vendor Fix See Kiali 1.73.28 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x https://access.redhat.com/errata/RHSA-2026:5132
Workaround Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

Vendor Fix See Kiali 1.73.28 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x https://access.redhat.com/errata/RHSA-2026:5132

A flaw was found in Rollup, a JavaScript module bundler. Insecure file name sanitization in the core engine allows an attacker to control output filenames, potentially through command-line interface (CLI) inputs, manual chunk aliases, or malicious plugins. By using directory traversal sequences (`../`), an attacker can overwrite files anywhere on the host filesystem where the build process has write permissions. This vulnerability can lead to persistent remote code execution (RCE) by overwriting critical system or user configuration files.

CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Vendor Fix See Kiali 1.73.28 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x https://access.redhat.com/errata/RHSA-2026:5132
References
https://access.redhat.com/errata/RHSA-2026:5132 self
https://access.redhat.com/security/cve/CVE-2025-61726 external
https://access.redhat.com/security/cve/CVE-2025-68121 external
https://access.redhat.com/security/cve/CVE-2026-27606 external
https://access.redhat.com/security/cve/cve-2025-61726 external
https://access.redhat.com/security/cve/cve-2025-68121 external
https://access.redhat.com/security/cve/cve-2026-27606 external
https://access.redhat.com/security/updates/classi… external
https://access.redhat.com/security/updates/classi… external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2025-61726 self
https://bugzilla.redhat.com/show_bug.cgi?id=2434432 external
https://www.cve.org/CVERecord?id=CVE-2025-61726 external
https://nvd.nist.gov/vuln/detail/CVE-2025-61726 external
https://go.dev/cl/736712 external
https://go.dev/issue/77101 external
https://groups.google.com/g/golang-announce/c/Vd2… external
https://pkg.go.dev/vuln/GO-2026-4341 external
https://access.redhat.com/security/cve/CVE-2025-68121 self
https://bugzilla.redhat.com/show_bug.cgi?id=2437111 external
https://www.cve.org/CVERecord?id=CVE-2025-68121 external
https://nvd.nist.gov/vuln/detail/CVE-2025-68121 external
https://go.dev/cl/737700 external
https://go.dev/issue/77217 external
https://groups.google.com/g/golang-announce/c/K09… external
https://pkg.go.dev/vuln/GO-2026-4337 external
https://access.redhat.com/security/cve/CVE-2026-27606 self
https://bugzilla.redhat.com/show_bug.cgi?id=2442530 external
https://www.cve.org/CVERecord?id=CVE-2026-27606 external
https://nvd.nist.gov/vuln/detail/CVE-2026-27606 external
https://github.com/rollup/rollup/commit/c60770d7a… external
https://github.com/rollup/rollup/commit/c8cf1f9c4… external
https://github.com/rollup/rollup/commit/d6dee5e99… external
https://github.com/rollup/rollup/releases/tag/v2.80.0 external
https://github.com/rollup/rollup/releases/tag/v3.30.0 external
https://github.com/rollup/rollup/releases/tag/v4.59.0 external
https://github.com/rollup/rollup/security/advisor… external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6\n\nThis update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kiali 1.73.28, for Red Hat OpenShift Service Mesh 2.6, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.\n\nSecurity Fix(es):\n\n* kiali-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)\n\n* kiali-rhel8: Rollup: Remote Code Execution via Path Traversal Vulnerability (CVE-2026-27606)\n\n* kiali-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:5132",
        "url": "https://access.redhat.com/errata/RHSA-2026:5132"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
        "url": "https://access.redhat.com/security/cve/CVE-2025-61726"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-68121",
        "url": "https://access.redhat.com/security/cve/CVE-2025-68121"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2026-27606",
        "url": "https://access.redhat.com/security/cve/CVE-2026-27606"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-61726",
        "url": "https://access.redhat.com/security/cve/cve-2025-61726"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2025-68121",
        "url": "https://access.redhat.com/security/cve/cve-2025-68121"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/cve-2026-27606",
        "url": "https://access.redhat.com/security/cve/cve-2026-27606"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification",
        "url": "https://access.redhat.com/security/updates/classification"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5132.json"
      }
    ],
    "title": "Red Hat Security Advisory: Kiali 1.73.28 for Red Hat OpenShift Service Mesh 2.6",
    "tracking": {
      "current_release_date": "2026-03-22T13:45:10+00:00",
      "generator": {
        "date": "2026-03-22T13:45:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.3"
        }
      },
      "id": "RHSA-2026:5132",
      "initial_release_date": "2026-03-19T14:09:55+00:00",
      "revision_history": [
        {
          "date": "2026-03-19T14:09:55+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-03-19T14:10:03+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-03-22T13:45:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift Service Mesh 2.6",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh 2.6",
                  "product_id": "Red Hat OpenShift Service Mesh 2.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:service_mesh:2.6::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Service Mesh"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-rhel8@sha256%3A5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059917"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-ossmc-rhel8@sha256%3Ac37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059840"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-rhel8@sha256%3A6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059917"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-ossmc-rhel8@sha256%3A708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059840"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "arm64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-rhel8@sha256%3A6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059917"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-ossmc-rhel8@sha256%3Aaf899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059840"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-rhel8@sha256%3Aa51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059917"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
                  "product_id": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/kiali-ossmc-rhel8@sha256%3A5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh\u0026tag=1773059840"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64 as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x as a component of Red Hat OpenShift Service Mesh 2.6",
          "product_id": "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x",
        "relates_to_product_reference": "Red Hat OpenShift Service Mesh 2.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-61726",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2026-01-28T20:01:42.791305+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2434432"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "RHBZ#2434432",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/736712",
          "url": "https://go.dev/cl/736712"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77101",
          "url": "https://go.dev/issue/77101"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
          "url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4341",
          "url": "https://pkg.go.dev/vuln/GO-2026-4341"
        }
      ],
      "release_date": "2026-01-28T19:30:31.215000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-19T14:09:55+00:00",
          "details": "See Kiali 1.73.28 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5132"
        },
        {
          "category": "workaround",
          "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
    },
    {
      "cve": "CVE-2025-68121",
      "discovery_date": "2026-02-05T18:01:30.086058+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2437111"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "crypto/tls: Unexpected session resumption in crypto/tls",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "RHBZ#2437111",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437111"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-68121",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68121"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/737700",
          "url": "https://go.dev/cl/737700"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/77217",
          "url": "https://go.dev/issue/77217"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
          "url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2026-4337",
          "url": "https://pkg.go.dev/vuln/GO-2026-4337"
        }
      ],
      "release_date": "2026-02-05T17:48:44.141000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-19T14:09:55+00:00",
          "details": "See Kiali 1.73.28 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5132"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "crypto/tls: Unexpected session resumption in crypto/tls"
    },
    {
      "cve": "CVE-2026-27606",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "discovery_date": "2026-02-25T04:01:24.449922+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2442530"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Rollup, a JavaScript module bundler. Insecure file name sanitization in the core engine allows an attacker to control output filenames, potentially through command-line interface (CLI) inputs, manual chunk aliases, or malicious plugins. By using directory traversal sequences (`../`), an attacker can overwrite files anywhere on the host filesystem where the build process has write permissions. This vulnerability can lead to persistent remote code execution (RCE) by overwriting critical system or user configuration files.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
        ],
        "known_not_affected": [
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
          "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-27606"
        },
        {
          "category": "external",
          "summary": "RHBZ#2442530",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442530"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-27606",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-27606"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27606",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27606"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2",
          "url": "https://github.com/rollup/rollup/commit/c60770d7aaf750e512c1b2774989ea4596e660b2"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e",
          "url": "https://github.com/rollup/rollup/commit/c8cf1f9c48c516285758c1e11f08a54f304fd44e"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3",
          "url": "https://github.com/rollup/rollup/commit/d6dee5e99bb82aac0bee1df4ab9efbde455452c3"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/releases/tag/v2.80.0",
          "url": "https://github.com/rollup/rollup/releases/tag/v2.80.0"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/releases/tag/v3.30.0",
          "url": "https://github.com/rollup/rollup/releases/tag/v3.30.0"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/releases/tag/v4.59.0",
          "url": "https://github.com/rollup/rollup/releases/tag/v4.59.0"
        },
        {
          "category": "external",
          "summary": "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc",
          "url": "https://github.com/rollup/rollup/security/advisories/GHSA-mw96-cpmx-2vgc"
        }
      ],
      "release_date": "2026-02-25T02:08:06.682000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-19T14:09:55+00:00",
          "details": "See Kiali 1.73.28 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x",
          "product_ids": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5132"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bccd71519ece8217238731eec2d8aea226b53403e111113e94086d0695a1619_s390x",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:708f623ecd4790488b9377dac0417ce9c99e52a350a5d387722608beb54d5a63_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:af899fd57742510613433c8d9dab94989f4c5c9f7f3631985e4e8296a5781ea2_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:c37bc564685eacc236f7e9a3df6a9b3f0c1ee4bcaa0ee52ec42df6a27e4e4339_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:5a8a46e92a178be088251e0dcb67612d16bafeee910af6bd55de82a4727daa02_amd64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6487d8be05cb57a356dd53769f93c84d0abb3729ce1b39041c4d02247ad8e771_ppc64le",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:6c91551425148cad302317d8aac839b04e95dc7ecdf02cb8bddf4aaa87dcd550_arm64",
            "Red Hat OpenShift Service Mesh 2.6:registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:a51a1b8587c6d4d63ba802112dd8b4a79d87a8af8dbf5341a3e5e917cae437dd_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "rollup: Rollup: Remote Code Execution via Path Traversal Vulnerability"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…