Issued:
2026-03-02
Updated:
2026-03-02

RHSA-2026:3559 - Red Hat OpenShift Service Mesh 2.6.14


Synopsis

Red Hat OpenShift Service Mesh 2.6.14

Type/Severity

Security Advisory Important

Topic

Red Hat OpenShift Service Mesh 2.6.14

This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat OpenShift Service Mesh 2.6.14, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application.

Security Fix(es):

  • istio-operator-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)

  • istio-cni-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)

  • pilot-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)

  • ratelimit-rhel8: Unexpected session resumption in crypto/tls (CVE-2025-68121)

  • istio-operator-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)

  • istio-cni-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)

  • pilot-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)

  • ratelimit-rhel8: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)

  • istio-operator-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)

  • istio-cni-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)

  • pilot-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)

  • ratelimit-rhel8: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)

  • istio-operator-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)

  • istio-cni-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)

  • pilot-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)

  • ratelimit-rhel8: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)

  • istio-operator-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)

  • istio-cni-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)

  • pilot-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)

  • ratelimit-rhel8: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)

Solution

See Red Hat OpenShift Service Mesh 2.6.14 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/service_mesh/service-mesh-2-x

Affected Products

ProductVersionArch
Red Hat OpenShift Service Mesh2.6x86_64

Fixes

(none)

CVEs

(none)

References


Additional information