Name | CVE-2021-20199 |
Description | Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libpod (PTS) | bullseye | 3.0.1+dfsg1-3+deb11u5 | fixed |
| bookworm | 4.3.1+ds1-8+deb12u1 | fixed |
| sid | 5.2.2+ds1-2 | fixed |
rootlesskit (PTS) | bullseye | 0.14.2-1 | fixed |
| bookworm | 1.1.0-1 | fixed |
| sid, trixie | 2.0.2-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libpod | source | (unstable) | 3.0.0~rc2+dfsg1-2 | | | |
rootlesskit | source | (unstable) | 0.12.0-1 | | | |
Notes
https://github.com/containers/podman/issues/5138
https://github.com/containers/podman/pull/9052
https://github.com/rootless-containers/rootlesskit/pull/206
For Podman v3.0: https://github.com/containers/podman/pull/9225 (v3.0.0-rc3)
Issue in podman was fixed by linking against rootlesskit 0.12, and Debian updated
ahead of time