{"id":"RHSA-2020:3369","summary":"Red Hat Security Advisory: Red Hat OpenShift Service Mesh security update","modified":"2026-04-21T10:01:40Z","published":"2024-09-30T13:53:57Z","upstream":["CVE-2020-11023","CVE-2020-12666","CVE-2020-14040","CVE-2020-8203","CVE-2020-9283"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:3369"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1804533"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850004"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850034"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853652"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1857412"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3369.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-8203"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-8203"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8203"},{"type":"ARTICLE","url":"https://hackerone.com/reports/712065"},{"type":"ARTICLE","url":"https://www.npmjs.com/advisories/1523"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-9283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-9283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9283"},{"type":"ARTICLE","url":"https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11023"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11023"},{"type":"ARTICLE","url":"https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-12666"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-12666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12666"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-14040"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-14040"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14040"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/39491"},{"type":"ARTICLE","url":"https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0"}],"affected":[{"package":{"name":"kiali","ecosystem":"Red Hat:service_mesh:1.1::el7","purl":"pkg:rpm/redhat/kiali"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:v1.12.10.redhat2-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"ior","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/ior"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-citadel","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-citadel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-cni","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-cni"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-galley","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-galley"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-grafana","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-grafana"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.4.3-13.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-grafana-prometheus","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-grafana-prometheus"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.4.3-13.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-istioctl","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-istioctl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-mixc","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-mixc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-mixs","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-mixs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-operator","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-operator"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-pilot-agent","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-pilot-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-pilot-discovery","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-pilot-discovery"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-prometheus","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-prometheus"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.14.0-14.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}},{"package":{"name":"servicemesh-sidecar-injector","ecosystem":"Red Hat:service_mesh:1.1::el8","purl":"pkg:rpm/redhat/servicemesh-sidecar-injector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.6-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:3369.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}