Search for packages
| purl | pkg:rpm/redhat/atomic-openshift@3.11.248-1.git.0.92ee8ac?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-dxhw-y156-2kfz
Aliases: CVE-2020-8552 GHSA-82hx-w2r5-c2wq |
Kubernetes API Server DoS Via API Requests The Kubernetes API server component in Kubernetes versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests. | There are no reported fixed by versions. |
|
VCID-tc46-9vdm-xudz
Aliases: CVE-2020-8558 GHSA-wqv3-8cm6-h6wg |
Improper Authentication in Kubernetes A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234, because of this bug, that service would be potentially reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service. If the example service on port 1234 required no additional authentication (because it assumed that only other localhost processes could reach it), then it could be vulnerable to attacks that make use of this bug. | There are no reported fixed by versions. |
|
VCID-vfxz-vfmr-w3d1
Aliases: CVE-2020-8945 GHSA-m6wg-2mwg-4rfq |
GPGME Go wrapper contains Use After Free The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:14:03.339726+00:00 | RedHat Importer | Affected by | VCID-vfxz-vfmr-w3d1 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8945.json | 38.0.0 |
| 2026-04-01T14:09:30.673070+00:00 | RedHat Importer | Affected by | VCID-dxhw-y156-2kfz | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8552.json | 38.0.0 |
| 2026-04-01T14:05:55.251790+00:00 | RedHat Importer | Affected by | VCID-tc46-9vdm-xudz | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8558.json | 38.0.0 |