Issued:
2026-02-05
Updated:
2026-02-05

RHSA-2026:2148 - Kiali 2.11.6 for Red Hat OpenShift Service Mesh 3.1


Synopsis

Kiali 2.11.6 for Red Hat OpenShift Service Mesh 3.1

Type/Severity

Security Advisory Important

Topic

Kiali 2.11.6 for Red Hat OpenShift Service Mesh 3.1

This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Kiali 2.11.6, for Red Hat OpenShift Service Mesh 3.1, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.

Security Fix(es):

  • kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284 )

  • kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284 )

  • kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)

  • kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)

  • kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)

  • kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)

  • kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)

Solution

See Kiali 2.11.6 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.1/html/observability/kiali-operator-provided-by-red-hat

Affected Products

ProductVersionArch
Red Hat OpenShift Service Mesh3.1x86_64

Fixes

(none)

CVEs

(none)

References


Additional information