`podman` machine spawns the `gvproxy` process, which is intended to forward ports on the host machine to the VM. The `gvproxy` API runs on Port 7777, but binds to all IPs on the host potentially making private services on the VM accessible to the public internet.
Created podman tracking bugs for this issue: Affects: fedora-all [bug 2026676]
Issue also mentioned in the Internet. References: https://twitter.com/discordianfish/status/1463462371675066371
This vulnerability is impacting Podman version >=3.3.0 and >=3.4.0 The port forwarding and gvproxy support was introduced by this PR: https://github.com/containers/podman/commit/7ef3981abe2412727840a2886489a08c03a05299 Fix is already merged in the main Podman branch: https://github.com/containers/podman/pull/12283 But new version is not released yet.
@mheon Looks like another candidate for Podman v3.4.3
Podman v3.4.3 contains the fix for this CVE: https://github.com/containers/podman/releases/tag/v3.4.3
FEDORA-2021-6bc3fe7129 has been pushed to the Fedora 35 stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-2021-6bd024d2a7 has been pushed to the Fedora 34 stable repository. If problem still persists, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:7954 https://access.redhat.com/errata/RHSA-2022:7954
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-4024
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:10289 https://access.redhat.com/errata/RHSA-2024:10289