vulnerability
Rocky Linux: CVE-2021-20199: container-tools-rhel8 (RLSA-2021-1796)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Feb 2, 2021 | Mar 12, 2024 | Mar 31, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Feb 2, 2021
Added
Mar 12, 2024
Modified
Mar 31, 2026
Description
Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.
Solutions
rocky-upgrade-buildahrocky-upgrade-buildah-debuginforocky-upgrade-buildah-debugsourcerocky-upgrade-buildah-testsrocky-upgrade-buildah-tests-debuginforocky-upgrade-conmonrocky-upgrade-conmon-debuginforocky-upgrade-conmon-debugsourcerocky-upgrade-containernetworking-pluginsrocky-upgrade-containernetworking-plugins-debuginforocky-upgrade-containernetworking-plugins-debugsourcerocky-upgrade-containers-commonrocky-upgrade-critrocky-upgrade-criurocky-upgrade-criu-debuginforocky-upgrade-criu-debugsourcerocky-upgrade-fuse-overlayfsrocky-upgrade-fuse-overlayfs-debuginforocky-upgrade-fuse-overlayfs-debugsourcerocky-upgrade-libslirprocky-upgrade-libslirp-debuginforocky-upgrade-libslirp-debugsourcerocky-upgrade-libslirp-develrocky-upgrade-oci-seccomp-bpf-hookrocky-upgrade-oci-seccomp-bpf-hook-debuginforocky-upgrade-oci-seccomp-bpf-hook-debugsourcerocky-upgrade-podmanrocky-upgrade-podman-catatonitrocky-upgrade-podman-catatonit-debuginforocky-upgrade-podman-debuginforocky-upgrade-podman-debugsourcerocky-upgrade-podman-pluginsrocky-upgrade-podman-plugins-debuginforocky-upgrade-podman-remoterocky-upgrade-podman-remote-debuginforocky-upgrade-podman-testsrocky-upgrade-python3-criurocky-upgrade-skopeorocky-upgrade-skopeo-debuginforocky-upgrade-skopeo-debugsourcerocky-upgrade-skopeo-testsrocky-upgrade-slirp4netnsrocky-upgrade-slirp4netns-debuginforocky-upgrade-slirp4netns-debugsource
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.