- Issued:
- 2026-03-19
- Updated:
- 2026-03-19
RHSA-2026:5130 - Kiali 2.17.5 for Red Hat OpenShift Service Mesh 3.2
Synopsis
Kiali 2.17.5 for Red Hat OpenShift Service Mesh 3.2
Type/Severity
Security Advisory Important
Topic
Kiali 2.17.5 for Red Hat OpenShift Service Mesh 3.2
This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Kiali 2.17.5, for Red Hat OpenShift Service Mesh 3.2, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.
Security Fix(es):
-
kiali-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
-
kiali-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)
Solution
See Kiali 2.17.5 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Service Mesh | 3.2 | x86_64 |
Fixes
(none)
CVEs
(none)
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.