- Issued:
- 2026-02-05
- Updated:
- 2026-02-05
RHSA-2026:2149 - Security Advisory
Synopsis
Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2
Type/Severity
Security Advisory: Important
Topic
Kiali 2.17.3 for Red Hat OpenShift Service Mesh 3.2
This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Kiali 2.17.3, for Red Hat OpenShift Service Mesh 3.2, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.
Security Fix(es):
- kiali-ossmc-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)
- kiali-rhel9: qs: Denial of Service via improper input validation in array parsing (CVE-2025-15284)
- kiali-rhel9: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 (CVE-2025-61729)
- kiali-ossmc-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)
- kiali-rhel9: React Router vulnerable to XSS via Open Redirects (CVE-2026-22029)
- kiali-ossmc-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)
- kiali-rhel9: prototype pollution in _.unset and _.omit functions (CVE-2025-13465)
Solution
See Kiali 2.17.3 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.2/html/observability/kiali-operator-provided-by-red-hat
Fixes
(none)CVEs
amd64
| registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:a97c82b48b920f1d3843d08dbe55d3759b237365e2b97501a640a1c0bd08d5ca |
| registry.redhat.io/openshift-service-mesh/kiali-operator-bundle@sha256:f3a430fc3f2bc6d3c66ea3ae3871987e3f5e8a17dd756008593ac5e7b48da289 |
| registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:447415cd243bbab90dc1c472f0acc5249b01a83eb7473934fc3bcbcf2c77d107 |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:c602eca72f7b82ac6431748219e88eb0500f5aaedd446ffacbce982cdb7321f1 |
arm64
| registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:d9c852cf7f5f21374f8ae2e31692fa30090dbe13fa66b3a608fc07d0a5e8ae2c |
| registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:46a3b372f155663da9a5caac4ee601ba834e35c129cbf144d28aab641b4cc7ca |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:fcb5d2c8e4ae372cb0009dc15d46eb5a10163139b61b063115c3d3fce90265e1 |
ppc64le
| registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ef18675f445508d01ae56ef59709b70d4b69187bb03425061cac62998f643fe5 |
| registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:d1b7f45b075f779df79d659fd07a3bfbb85a47468d6d856a2738d312a3d67e7d |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:700c2524c0def53bf8e5f7832c27496a3e9ff5c9d939d38c59a7fae167418e16 |
s390x
| registry.redhat.io/openshift-service-mesh/kiali-rhel9@sha256:ced99993701c64b69f412c0ef9991a8d6d38ee1c8520330c4ac999addbb3bbbe |
| registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:22a68e23c1b378898676346df798973f60c1784f93fcbcca713d1b09f19d251f |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel9@sha256:d2d862c021ddcd974a12d63ea6c270e2de651201182c16baa3e24f7ce8985daf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.