- Issued:
- 2026-04-16
- Updated:
- 2026-04-16
RHSA-2026:8483 - Security Advisory
Synopsis
Kiali 1.73.29 for Red Hat OpenShift Service Mesh 2.6
Type/Severity
Security Advisory: Critical
Topic
Kiali 1.73.29 for Red Hat OpenShift Service Mesh 2.6 is now available.
An update is now available for Red Hat OpenShift Service Mesh 2.6. This advisory contains the RPM packages for the Kiali component.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Kiali 1.73.29, for Red Hat OpenShift Service Mesh 2.6, provides observability for the service mesh by offering a visual representation of the mesh topology and metrics, helping users monitor, trace, and manage efficiently.
Security Fix(es):
- CVE-2025-61726 Memory exhaustion in query parameter parsing in net/url (OSSM-12470)
- CVE-2025-62718 Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization (OSSM-13225, OSSM-13226)
- CVE-2025-68121 Unexpected session resumption in crypto/tls (OSSM-12553)
- CVE-2026-25679 Incorrect parsing of IPv6 host literals in net/url (OSSM-12952)
- CVE-2026-27606 Rollup: Remote Code Execution via Path Traversal Vulnerability (OSSM-12689)
- CVE-2026-29074 SVGO: Denial of Service via XML entity expansion (OSSM-12891)
- CVE-2026-29063 Immutable.js: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (OSSM-12970, OSSM-12971)
- CVE-2026-33186 gRPC-Go: Authorization bypass due to improper HTTP/2 path validation (OSSM-12996)
- CVE-2026-4800 lodash: Arbitrary code execution via untrusted input in template imports (OSSM-13112, OSSM-13113)
- CVE-2026-40175 Axios: Remote Code Execution via Prototype Pollution escalation (OSSM-13249, OSSM-13250)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
See Kiali 1.73.29 documentation at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/service_mesh/service-mesh-2-x
Fixes
(none)CVEs
amd64
| registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:d4a4b0719e113cdbfd763946d8c9e1adf9d59352657680abec71a7094fc73a4d |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:5a8f7d36fcf35bfc9260ac3e3629790d607405ecd692a9d87c29b1257cfb6d51 |
arm64
| registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:7eb2835c07bac105bfa2661398245cbebbc7acf9924229b8dce38db7dd3fabbb |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:6c99c3ca8c99dfa4d49e6be2dd651345a4f6e2267fb2e06ab8acec04880d71c9 |
ppc64le
| registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:ecb548342d0ea45b30c965e86678068c5735bd603b7d6507308f5566f7b8c7cf |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7a923633d55a9b67580732d7449e2631b07787ae22431888245dc234bca5871 |
s390x
| registry.redhat.io/openshift-service-mesh/kiali-rhel8@sha256:56e3e74a021ca82802a7ec1e9b62ba3770e0c27a4039f9ea69a9b1ce89f2f3bb |
| registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8@sha256:2723d4214014bab37f24dd8311306f757bf12284085ed6c2bcd8176478a2e1b0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.