vulnerability
Rocky Linux: CVE-2019-9946: container-tools-rhel8 (RLSA-2019-3403)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Apr 2, 2019 | Mar 12, 2024 | Aug 13, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Apr 2, 2019
Added
Mar 12, 2024
Modified
Aug 13, 2025
Description
Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
Solutions
rocky-upgrade-oci-systemd-hookrocky-upgrade-oci-systemd-hook-debuginforocky-upgrade-oci-systemd-hook-debugsourcerocky-upgrade-oci-umountrocky-upgrade-oci-umount-debuginforocky-upgrade-oci-umount-debugsource
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.