Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
purl pkg:deb/debian/kubernetes@1.18.5-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-2cbk-c4k3-kyc8 Privilege Escalation in Kubernetes The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.7 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. CVE-2020-8559
GHSA-33c5-9fx5-fvjm
VCID-tc46-9vdm-xudz Improper Authentication in Kubernetes A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug. CVE-2020-8558
GHSA-wqv3-8cm6-h6wg
VCID-wpwc-fkd7-qugm Denial of service in Kubernetes The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If a pod writes a large amount of data to the /etc/hosts file, it could fill the storage space of the node and cause the node to fail. CVE-2020-8557
GHSA-55qj-gj3x-jq9r

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:29:00.997466+00:00 Debian Importer Fixing VCID-2cbk-c4k3-kyc8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:23:43.905129+00:00 Debian Importer Fixing VCID-tc46-9vdm-xudz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:23:34.804329+00:00 Debian Importer Fixing VCID-wpwc-fkd7-qugm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:32:48.380430+00:00 Debian Importer Fixing VCID-2cbk-c4k3-kyc8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:28:56.107108+00:00 Debian Importer Fixing VCID-tc46-9vdm-xudz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:28:49.347326+00:00 Debian Importer Fixing VCID-wpwc-fkd7-qugm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:28:15.395229+00:00 Debian Importer Fixing VCID-2cbk-c4k3-kyc8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:15.354605+00:00 Debian Importer Fixing VCID-tc46-9vdm-xudz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:28:15.314245+00:00 Debian Importer Fixing VCID-wpwc-fkd7-qugm https://security-tracker.debian.org/tracker/data/json 38.1.0