- Issued:
- 2026-03-02
- Updated:
- 2026-03-02
RHSA-2026:3556 - Red Hat OpenShift Service Mesh 2.6.14
Synopsis
Red Hat OpenShift Service Mesh 2.6.14
Type/Severity
Security Advisory Important
Topic
Red Hat OpenShift Service Mesh 2.6.14
This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Service Mesh 2.6.14, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application.
Security Fix(es):
-
proxyv2-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)
-
proxyv2-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
-
proxyv2-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)
-
proxyv2-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
-
proxyv2-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
Solution
See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Service Mesh | 2.6 | x86_64 |
Fixes
(none)
CVEs
(none)
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.