Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/atomic-openshift@3.11.157-1.git.0.dfe38da?arch=el7
purl pkg:rpm/redhat/atomic-openshift@3.11.157-1.git.0.dfe38da?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-rwt5-ctc9-tba1
Aliases:
CVE-2019-11250
GHSA-jmrx-5g74-6v2f
Kubernetes client-go library logs may disclose credentials to unauthorized users The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity levels, are affected. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:17:45.648362+00:00 RedHat Importer Affected by VCID-rwt5-ctc9-tba1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11250.json 38.0.0