First published: Mon Aug 31 2020(Updated: )
A flaw was discovered in Podman before upstream version 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first containers will get leaked into subsequent containers. An attacker who has control over those subsequent containers may get access to secrets shared with previous containers through environment variables.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/podman | <0:1.6.4-26.el7_9 | 0:1.6.4-26.el7_9 |
redhat/podman | <0:1.9.3-3.rhaos4.6.el8 | 0:1.9.3-3.rhaos4.6.el8 |
Podman Project Podman | <2.0.5 | |
Redhat Openshift Container Platform | =4.6 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
redhat/podman | <2.0.5 | 2.0.5 |
go/github.com/containers/podman/v2 | <2.0.5 | 2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-14370 is an information disclosure vulnerability found in containers/podman versions before 2.0.5.
The vulnerability in CVE-2020-14370 allows environment variables from the first container to leak into subsequent containers when using the deprecated Varlink API or the Docker-compatible REST API.
The severity of CVE-2020-14370 is medium.
To fix CVE-2020-14370, update to containers/podman version 2.0.5 or later.
You can find more information about CVE-2020-14370 on the GitHub commit, Bugzilla report, and Red Hat Security Advisory linked in the references section.