Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/kubernetes@0?distro=trixie
purl pkg:deb/debian/kubernetes@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (20)
Vulnerability Summary Aliases
VCID-2ej9-nn86-7bet Kubernetes kubectl cp Vulnerable to Symlink Attack The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree. CVE-2019-11251
GHSA-6qfg-8799-r575
VCID-57ar-astn-b7eu Kubernetes Unsafe Cacheing In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (`rw-rw-rw-`). If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation. CVE-2019-11244
GHSA-2575-pghm-6qqx
VCID-6nk9-wkwg-ukeh Information Exposure in Kubernetes Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name. CVE-2015-7528
GHSA-mqf3-28j7-3mj6
VCID-cjth-qqvy-hqhk Kubelet Incorrect Privilege Assignment In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit `runAsUser` attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified `mustRunAsNonRoot: true`, the kubelet will refuse to start the container as root. If the pod did not specify `mustRunAsNonRoot: true`, the kubelet will run the container as uid 0. CVE-2019-11245
GHSA-r76g-g87f-vw8f
VCID-dxej-zg13-63ff Kubernetes did not effectively clear service account credentials In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig() CVE-2019-11243
GHSA-gc2p-g4fg-29vh
VCID-eztq-5cu5-7yfd Kubernetes Arbitrary Command Injection In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection. ### Specific Go Packages Affected k8s.io/kubernetes/pkg/util/mount CVE-2018-1002101
GHSA-wqwf-x5cj-rg56
VCID-fmcb-kpgu-5fcg Authorization bypass in Openshift Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed. CVE-2016-1906
GHSA-m3fm-h5jp-q79p
VCID-humx-y4h8-pbeb kubernetes: Incomplete fix for CVE-2019-1002101 allows for arbitrary file write via `kubectl cp` CVE-2019-11246
VCID-k31a-cbd1-wkh5 Access Restriction Bypass in kubernetes The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object. ### Specific Go Packages Affected github.com/kubernetes/kubernetes/pkg/apiserver CVE-2016-1905
GHSA-xx8c-m748-xr4j
VCID-m3n6-yj6t-y7eq kubernetes: Incorrect default access permissions for Persistent Volumes CVE-2017-1002100
VCID-qpg5-h1k8-yydt Directory Traversal in Kubernetes Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd. CVE-2015-5305
GHSA-jp32-vmm6-3vf5
VCID-qxw4-2hry-uuf4 Kubernetes Improper Input Validation vulnerability A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes. CVE-2023-5528
GHSA-hq6q-c2x6-hmch
VCID-srhm-91w1-k3h7 kubelet: runAsNonRoot logic bypass for Windows containers CVE-2021-25749
VCID-sur2-ewj3-8bgx Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below. CVE-2024-9042
GHSA-vv39-3w5q-974q
VCID-u8h6-kbws-8fbp Sensitive Information leak via Log File in Kubernetes In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3. CVE-2020-8563
GHSA-5xfg-wv98-264m
VCID-vctf-a4t5-q7a2 Unverified Ownership in Kubernetes Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect. CVE-2020-8554
GHSA-j9wf-vvm6-4r9w
VCID-vj7p-66bc-7yam Symlink Attack in kubectl cp The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0. CVE-2019-1002101
GHSA-34jx-wx69-9x8v
VCID-w9b7-vajk-3kdq Kube-proxy may unintentionally forward traffic Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (`spec.ports[*].port`) as a LoadBalancer Service when the LoadBalancer controller does not set the `status.loadBalancer.ingress[].ip` field. Clusters where the LoadBalancer controller sets the `status.loadBalancer.ingress[].ip` field are unaffected. CVE-2021-25736
GHSA-35c7-w35f-xwgh
VCID-xcss-tfeh-w7a6 kubernetes: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal CVE-2019-11249
VCID-zexe-7ywv-cbcf Kubernetes sets incorrect permissions on Windows containers logs A security issue was discovered in Kubernetes clusters with Windows nodes where BUILTIN\Users may be able to read container logs and NT AUTHORITY\Authenticated Users may be able to modify container logs. CVE-2024-5321
GHSA-82m2-cv7p-4m75

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:26:30.021079+00:00 Debian Importer Fixing VCID-k31a-cbd1-wkh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:13.746783+00:00 Debian Importer Fixing VCID-w9b7-vajk-3kdq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:16:26.033092+00:00 Debian Importer Fixing VCID-eztq-5cu5-7yfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:02:04.397586+00:00 Debian Importer Fixing VCID-dxej-zg13-63ff https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:15:18.620211+00:00 Debian Importer Fixing VCID-sur2-ewj3-8bgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:52:26.927623+00:00 Debian Importer Fixing VCID-vctf-a4t5-q7a2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:52:18.835139+00:00 Debian Importer Fixing VCID-vj7p-66bc-7yam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:50:13.772567+00:00 Debian Importer Fixing VCID-cjth-qqvy-hqhk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:35:21.839419+00:00 Debian Importer Fixing VCID-qxw4-2hry-uuf4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:01.033150+00:00 Debian Importer Fixing VCID-qpg5-h1k8-yydt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:37:28.813261+00:00 Debian Importer Fixing VCID-2ej9-nn86-7bet https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:34.981367+00:00 Debian Importer Fixing VCID-u8h6-kbws-8fbp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:19.731344+00:00 Debian Importer Fixing VCID-zexe-7ywv-cbcf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:57:53.680536+00:00 Debian Importer Fixing VCID-fmcb-kpgu-5fcg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:42.486107+00:00 Debian Importer Fixing VCID-m3n6-yj6t-y7eq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:45:51.551344+00:00 Debian Importer Fixing VCID-57ar-astn-b7eu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:44:20.866534+00:00 Debian Importer Fixing VCID-humx-y4h8-pbeb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:53.827895+00:00 Debian Importer Fixing VCID-xcss-tfeh-w7a6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:55.671327+00:00 Debian Importer Fixing VCID-6nk9-wkwg-ukeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:27.996046+00:00 Debian Importer Fixing VCID-srhm-91w1-k3h7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:16:23.622849+00:00 Debian Importer Fixing VCID-k31a-cbd1-wkh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:14:40.826760+00:00 Debian Importer Fixing VCID-w9b7-vajk-3kdq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:08:27.544699+00:00 Debian Importer Fixing VCID-eztq-5cu5-7yfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:32.435475+00:00 Debian Importer Fixing VCID-dxej-zg13-63ff https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:55.193999+00:00 Debian Importer Fixing VCID-sur2-ewj3-8bgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:25.773392+00:00 Debian Importer Fixing VCID-vctf-a4t5-q7a2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:19.163934+00:00 Debian Importer Fixing VCID-vj7p-66bc-7yam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:43.317132+00:00 Debian Importer Fixing VCID-cjth-qqvy-hqhk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:05.746686+00:00 Debian Importer Fixing VCID-qxw4-2hry-uuf4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:12:50.779196+00:00 Debian Importer Fixing VCID-qpg5-h1k8-yydt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:51.065794+00:00 Debian Importer Fixing VCID-2ej9-nn86-7bet https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:10.887594+00:00 Debian Importer Fixing VCID-u8h6-kbws-8fbp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:50.375325+00:00 Debian Importer Fixing VCID-zexe-7ywv-cbcf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:30.492902+00:00 Debian Importer Fixing VCID-fmcb-kpgu-5fcg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:13.456200+00:00 Debian Importer Fixing VCID-m3n6-yj6t-y7eq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:07.396437+00:00 Debian Importer Fixing VCID-57ar-astn-b7eu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:30:01.834806+00:00 Debian Importer Fixing VCID-humx-y4h8-pbeb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:24:05.039099+00:00 Debian Importer Fixing VCID-xcss-tfeh-w7a6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:55.890860+00:00 Debian Importer Fixing VCID-6nk9-wkwg-ukeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:36.256322+00:00 Debian Importer Fixing VCID-srhm-91w1-k3h7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:28:16.489865+00:00 Debian Importer Fixing VCID-sur2-ewj3-8bgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:16.414891+00:00 Debian Importer Fixing VCID-zexe-7ywv-cbcf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:16.306003+00:00 Debian Importer Fixing VCID-qxw4-2hry-uuf4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:15.955494+00:00 Debian Importer Fixing VCID-srhm-91w1-k3h7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:15.737000+00:00 Debian Importer Fixing VCID-w9b7-vajk-3kdq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:15.510361+00:00 Debian Importer Fixing VCID-u8h6-kbws-8fbp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:15.215297+00:00 Debian Importer Fixing VCID-vctf-a4t5-q7a2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.923192+00:00 Debian Importer Fixing VCID-2ej9-nn86-7bet https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.832368+00:00 Debian Importer Fixing VCID-xcss-tfeh-w7a6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.689545+00:00 Debian Importer Fixing VCID-humx-y4h8-pbeb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.648594+00:00 Debian Importer Fixing VCID-cjth-qqvy-hqhk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.607679+00:00 Debian Importer Fixing VCID-57ar-astn-b7eu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.566165+00:00 Debian Importer Fixing VCID-dxej-zg13-63ff https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.524674+00:00 Debian Importer Fixing VCID-vj7p-66bc-7yam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.342192+00:00 Debian Importer Fixing VCID-eztq-5cu5-7yfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.153044+00:00 Debian Importer Fixing VCID-m3n6-yj6t-y7eq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:14.022644+00:00 Debian Importer Fixing VCID-fmcb-kpgu-5fcg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:13.982222+00:00 Debian Importer Fixing VCID-k31a-cbd1-wkh5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:13.941263+00:00 Debian Importer Fixing VCID-6nk9-wkwg-ukeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:13.897541+00:00 Debian Importer Fixing VCID-qpg5-h1k8-yydt https://security-tracker.debian.org/tracker/data/json 38.1.0