- Issued:
- 2026-03-26
- Updated:
- 2026-03-26
RHSA-2026:5948 - Security Advisory
Synopsis
Red Hat OpenShift Service Mesh 3.0.9
Type/Severity
Security Advisory: Important
Topic
Red Hat OpenShift Service Mesh 3.0.9
This update has a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Service Mesh 3.0.9, which is based on the open source Istio project, addresses a variety of problems in a microservice architecture by creating a centralized point of control in an application.
Fixes/Improvements:
Security Fix(es):
- istio-rhel9-operator: Unexpected session resumption in crypto/tls (CVE-2025-68121)
- istio-cni-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)
- istio-pilot-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)
- istio-proxyv2-rhel9: Unexpected session resumption in crypto/tls (CVE-2025-68121)
- istio-rhel9-operator: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
- istio-cni-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
- istio-pilot-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
- istio-proxyv2-rhel9: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
- istio-rhel9-operator: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)
- istio-cni-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)
- istio-pilot-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)
- istio-proxyv2-rhel9: cmd/go: Arbitrary file write via malicious pkg-config directive (CVE-2025-61731)
- istio-rhel9-operator: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
- istio-cni-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
- istio-pilot-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
- istio-proxyv2-rhel9: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
- istio-rhel9-operator: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
- istio-cni-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
- istio-pilot-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
- istio-proxyv2-rhel9: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
- istio-pilot-rhel9: JWKS Resolver Failure May Expose Hardcoded Default Keys (CVE-2026-31837)
- istio-proxyv2-rhel9: JWKS Resolver Failure May Expose Hardcoded Default Keys (CVE-2026-31837)
Solution
See Red Hat OpenShift Service Mesh 3.0.9 documentation at https://docs.redhat.com/en/documentation/red_hat_openshift_service_mesh/3.0
Fixes
(none)CVEs
amd64
| registry.redhat.io/openshift-service-mesh/istio-sail-operator-bundle@sha256:6067e8bd752fec6a4c9791b5416feebd3755e812677393c1c2ad4746f5aced5e |
| registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:dcd2685d0f51bd9654e77891351273f5f9f93161efd413925c3d0b96b3bdbf0f |
| registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:041058c4ed2cc602c6a0fc41205de07791679bdf0511650fabb1a6251d5aff13 |
| registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:f9399b41994032dbf514eb7ab8576614e7139a35af239efc1f05de497b9755d1 |
| registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:620f6be30fde3c8a5416f94405f520902f47989d431904963c308885d59d0e42 |
| registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:8e17971e0f5d14b920841b11b2d084a1275bb942566edde1ac4789452ee92bd2 |
| registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:efdcf5819964e4edf19ec04f7b496d84bb705b4b0d2a9c7f8220ea2937d09d36 |
arm64
| registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:35b0638bd3e1f638b2493f92eca8125f6e74038bf43565c8c97dea61f016393d |
| registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:ef560e57543bec7d17f46e7baede5f906a5feb1d59feabca310feada79180b85 |
| registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:9d1c49aac324418a6c9422990e7e83aaffbd2bdf73cd37ab692ae19a6e675a18 |
| registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:62a7fccbf538f3512a128df0affa07ea332892512ca65c81546115af1d7ec124 |
| registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:efc87388d29385d36a26a19da1adb52bd9ef8dea42503b409d1f3d25769c3e76 |
| registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:b1f48cab9351f5a744c0a2839a3e4cffef152836bf3072511c858dafbed968bd |
ppc64le
| registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:396e3ba2ed81cb48d2d0ea4ec0373edd6f80fece16034e4dfe223ef7dd198fcd |
| registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cf5bb9941b6c806906e594b1cac7c73b94b91674956913b5f4c6f27be9d8faac |
| registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:fe35fc6ea8320c1d0e8ee0712788879daee23d4cea6b970237375e264344ddd0 |
| registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:84c065882a22024d24031bb1ae81e57a2596e51e84a94cc0132950448d465b50 |
| registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:473c10e26272fee90233bb95c1c434f45c4fce2170ee99ff674c2d56642c2ef4 |
| registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:da9731b2c26cb10466f835467e0c25fa2483ca260e2f31e92c2783cf73fce074 |
s390x
| registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:7a720e7d0cffeb4ceb132f928774c85d43a9adb01eddfd5dbaa9d747115b4357 |
| registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a23e3f64b7d99ff915b4dcbdc9e6efa3364435032b458cba0ee85951df428da |
| registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:e67e1607b7d2a354399aa5c32ad7e776650f95e978591f3e6fd80b335a0dd3e9 |
| registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:9dda1ca14a4d44819498e5e00470bedf540ba7cd5a6be015e47bbf1fe5aa8ca3 |
| registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:8238270e2aab1a016cd4e66de470f499e9f33e95a2547dd72722814e8b71063e |
| registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:aaffe72a3ceaa3ee1984579e52c8c9a15a1e45b55d53c8c00e2be62cbcd21b62 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.