Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/atomic-openshift@3.11.346-1.git.0.ea10721?arch=el7
purl pkg:rpm/redhat/atomic-openshift@3.11.346-1.git.0.ea10721?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-2cbk-c4k3-kyc8
Aliases:
CVE-2020-8559
GHSA-33c5-9fx5-fvjm
Privilege Escalation in Kubernetes The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.7 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. There are no reported fixed by versions.
VCID-x5e9-nj8f-aye9
Aliases:
CVE-2018-1002102
kubernetes: improper validation of URL redirection in the Kubernetes API server allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:14:58.368903+00:00 RedHat Importer Affected by VCID-x5e9-nj8f-aye9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1002102.json 38.0.0
2026-04-01T14:05:42.960875+00:00 RedHat Importer Affected by VCID-2cbk-c4k3-kyc8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8559.json 38.0.0