CVE-2021-4024
Description
A flaw was found in podman. The podman machine function (used to create and manage Podman virtual machine containing a Podman process) spawns a gvproxy process on the host system. The gvproxy API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the gvproxy API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Podman's `podman machine` command exposes the `gvproxy` API on all IP addresses (port 7777), allowing an attacker to forward host ports to the VM and potentially access private services.
Vulnerability
A flaw in Podman versions prior to 3.4.3 exposes the gvproxy API on all host IP addresses on TCP port 7777 when the podman machine command is used to create or manage a Podman virtual machine [2]. The gvproxy process, which handles port forwarding between the host and the VM, listens on 0.0.0.0:7777, making the API accessible on any network interface [1]. If the host's firewall allows inbound connections to port 7777, an attacker on the same network can interact with the API without authentication [2].
Exploitation
An attacker who can reach the host on TCP port 7777 (i.e., the port is not blocked by a firewall) can use the gvproxy API to forward arbitrary ports from the host to ports inside the Podman-managed VM [2]. The attacker does not require any prior authentication or special privileges on the host. By crafting API requests, they can map host services to the VM or vice versa, effectively bypassing network isolation [2].
Impact
Successful exploitation allows an attacker to make private services running inside the VM accessible to the external network, potentially leading to unauthorized access or data exposure [2]. Additionally, the attacker could forward all host ports to the VM, causing a denial of service by interrupting legitimate host services [2]. The impact is limited to the configuration managed by podman machine; the host and other containers may remain unaffected.
Mitigation
The vulnerability is fixed in Podman version 3.4.3, released on December 13, 2021 [3]. Users should upgrade to this version or later. If upgrading is not immediately possible, blocking inbound connections to TCP port 7777 on the host firewall can prevent exploitation from the network [2]. No workaround is available for systems where podman machine is in use and the fix cannot be applied. The CVE is not currently listed in the KEV catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/containers/podman/v3Go | < 3.4.3 | 3.4.3 |
Affected products
60- podman/podmandescription
- ghsa-coords59 versionspkg:golang/github.com/containers/podman/v3pkg:rpm/almalinux/aardvark-dnspkg:rpm/almalinux/buildahpkg:rpm/almalinux/buildah-testspkg:rpm/almalinux/cockpit-podmanpkg:rpm/almalinux/conmonpkg:rpm/almalinux/containernetworking-pluginspkg:rpm/almalinux/containers-commonpkg:rpm/almalinux/container-selinuxpkg:rpm/almalinux/critpkg:rpm/almalinux/criupkg:rpm/almalinux/criu-develpkg:rpm/almalinux/criu-libspkg:rpm/almalinux/crunpkg:rpm/almalinux/fuse-overlayfspkg:rpm/almalinux/libslirppkg:rpm/almalinux/libslirp-develpkg:rpm/almalinux/netavarkpkg:rpm/almalinux/oci-seccomp-bpf-hookpkg:rpm/almalinux/podmanpkg:rpm/almalinux/podman-catatonitpkg:rpm/almalinux/podman-dockerpkg:rpm/almalinux/podman-gvproxypkg:rpm/almalinux/podman-pluginspkg:rpm/almalinux/podman-remotepkg:rpm/almalinux/podman-testspkg:rpm/almalinux/python3-criupkg:rpm/almalinux/python3-podmanpkg:rpm/almalinux/runcpkg:rpm/almalinux/skopeopkg:rpm/almalinux/skopeo-testspkg:rpm/almalinux/slirp4netnspkg:rpm/almalinux/toolboxpkg:rpm/almalinux/toolbox-testspkg:rpm/almalinux/udicapkg:rpm/opensuse/conmon&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/libcontainers-common&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/libseccomp&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/podman&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/podman&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/podman&distro=openSUSE%20Leap%20Micro%205.2pkg:rpm/opensuse/podman&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/podman&distro=openSUSE%20Tumbleweedpkg:rpm/suse/conmon&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/conmon&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP3pkg:rpm/suse/libcontainers-common&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/libcontainers-common&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/libseccomp&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/libseccomp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/podman&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP3pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP4pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3
< 3.4.3+ 58 more
- (no CPE)range: < 3.4.3
- (no CPE)range: < 2:1.10.1-2.module_el8.10.0+3909+6e1c1eb7
- (no CPE)range: < 2:1.33.11-1.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 2:1.33.11-1.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 84.1-1.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 3:2.1.10-1.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 1:1.4.0-5.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 2:1-82.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 2:2.229.0-2.module_el8.10.0+3909+6e1c1eb7
- (no CPE)range: < 3.18-5.module_el8.10.0+3901+4b80ecd7
- (no CPE)range: < 3.18-5.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 3.18-5.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 3.18-5.module_el8.10.0+3845+87b84552
- (no CPE)range: < 1.14.3-2.module_el8.10.0+3845+87b84552
- (no CPE)range: < 1.13-1.module_el8.10.0+3909+6e1c1eb7
- (no CPE)range: < 4.4.0-2.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
- (no CPE)range: < 2:1.10.3-1.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 1.2.10-1.module_el8.10.0+3909+6e1c1eb7
- (no CPE)range: < 2:4.2.0-3.el9
- (no CPE)range: < 4:4.9.4-18.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 2:4.2.0-3.el9
- (no CPE)range: < 2:4.2.0-3.el9
- (no CPE)range: < 2:4.2.0-3.el9
- (no CPE)range: < 2:4.2.0-3.el9
- (no CPE)range: < 2:4.2.0-3.el9
- (no CPE)range: < 3.18-5.module_el8.10.0+3858+6ad51f9f
- (no CPE)range: < 4.9.0-3.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 1:1.1.12-5.module_el8.10.0+3909+6e1c1eb7
- (no CPE)range: < 2:1.14.5-3.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 2:1.14.5-3.module_el8.10.0+3876+e55593a8
- (no CPE)range: < 1.2.3-1.module_el8.10.0+3845+87b84552
- (no CPE)range: < 0.0.99.5-2.module_el8.10.0+3901+4b80ecd7
- (no CPE)range: < 0.0.99.5-2.module_el8.10.0+3858+6ad51f9f
- (no CPE)range: < 0.2.6-21.module_el8.10.0+3926+f12484f5
- (no CPE)range: < 2.0.30-150300.8.3.1
- (no CPE)range: < 20210626-150300.8.3.1
- (no CPE)range: < 2.5.3-150300.10.5.1
- (no CPE)range: < 3.4.4-150300.9.3.2
- (no CPE)range: < 4.3.1-150400.4.11.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150400.4.11.1
- (no CPE)range: < 3.4.4-1.1
- (no CPE)range: < 2.0.30-150300.8.3.1
- (no CPE)range: < 2.0.30-150300.8.3.1
- (no CPE)range: < 20210626-150300.8.3.1
- (no CPE)range: < 20210626-150300.8.3.1
- (no CPE)range: < 2.5.3-150300.10.5.1
- (no CPE)range: < 2.5.3-150300.10.5.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150400.4.11.1
- (no CPE)range: < 3.4.4-150300.9.3.2
- (no CPE)range: < 4.3.1-150400.4.11.1
- (no CPE)range: < 4.3.1-150300.9.15.1
- (no CPE)range: < 4.3.1-150300.9.15.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-3cf2-x423-x582ghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2021-4024ghsaADVISORY
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_MISC
- bugzilla.redhat.com/show_bug.cgighsaWEB
- github.com/containers/podman/releases/tag/v3.4.3ghsax_refsource_MISCWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3ghsaWEB
News mentions
0No linked articles in our index yet.