First published: Fri Jan 01 2021(Updated: )
A flaw was found in podman. Rootless containers receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts) which impact containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. The highest threat from this vulnerability is to data integrity.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/containers/podman/v3 | <3.0.0 | 3.0.0 |
redhat/podman | <3.0 | 3.0 |
redhat/podman | <2:4.2.0-3.el9 | 2:4.2.0-3.el9 |
Podman Project Podman | >=1.8.0<3.0.0 |
Configure containerized applications to require authentication for connections from all sources, including localhost.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20199.
The severity of CVE-2021-20199 is medium with a CVSS score of 5.9.
CVE-2021-20199 impacts rootless containers running with Podman by causing them to receive all traffic with a source IP address of 127.0.0.1, including from remote hosts.
Containerized applications that trust localhost (127.0.0.1) connections by default and do not require authentication are affected by CVE-2021-20199.
To fix CVE-2021-20199, you should update your Podman package to version 2.4.2-3.el9 or later.