Bug 2026675 (CVE-2021-4024)

Summary: CVE-2021-4024 podman: podman machine spawns gvproxy with port bound to all IPs
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acui, bbaude, bmontgom, container-sig, debarshir, dwalsh, eparis, jburrell, jligon, jnovy, lsm5, mheon, nstielau, patrick, pehunt, pthomas, rh.container.bot, santiago, sponnaga, tsweeney, umohnani, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: podman 3.4.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-06 00:33:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2026676, 2029450, 2029451, 2029452    
Bug Blocks: 2026677, 2026929    

Description Pedro Sampaio 2021-11-25 13:35:46 UTC
`podman` machine spawns the `gvproxy` process, which is intended to forward ports on the host machine to the VM. The `gvproxy` API runs on Port 7777, but binds to all IPs on the host potentially making private services on the VM accessible to the public internet.

Comment 1 Pedro Sampaio 2021-11-25 13:36:13 UTC
Created podman tracking bugs for this issue:

Affects: fedora-all [bug 2026676]

Comment 2 Przemyslaw Roguski 2021-11-26 13:33:50 UTC
Issue also mentioned in the Internet.
References:
https://twitter.com/discordianfish/status/1463462371675066371

Comment 4 Przemyslaw Roguski 2021-11-29 15:42:30 UTC
This vulnerability is impacting Podman version >=3.3.0 and >=3.4.0 
The port forwarding and gvproxy support was introduced by this PR:
https://github.com/containers/podman/commit/7ef3981abe2412727840a2886489a08c03a05299


Fix is already merged in the main Podman branch:
https://github.com/containers/podman/pull/12283
But new version is not released yet.

Comment 5 Tom Sweeney 2021-11-30 23:00:30 UTC
@mheon Looks like another candidate for Podman v3.4.3

Comment 8 Przemyslaw Roguski 2021-12-09 11:33:16 UTC
Podman v3.4.3 contains the fix for this CVE:
https://github.com/containers/podman/releases/tag/v3.4.3

Comment 9 Fedora Update System 2021-12-17 01:10:46 UTC
FEDORA-2021-6bc3fe7129 has been pushed to the Fedora 35 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 11 Fedora Update System 2022-02-08 01:07:48 UTC
FEDORA-2021-6bd024d2a7 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 13 errata-xmlrpc 2022-11-15 09:47:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7954 https://access.redhat.com/errata/RHSA-2022:7954

Comment 14 Product Security DevOps Team 2022-12-06 00:33:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-4024

Comment 15 Red Hat Bugzilla 2023-09-18 04:28:32 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days

Comment 16 errata-xmlrpc 2024-11-26 06:43:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:10289 https://access.redhat.com/errata/RHSA-2024:10289