PT-2025-31142 · Netavark +1 · Netavark +1
Published
2025-07-28
·
Updated
2025-07-29
·
CVE-2025-8283
3.7
Low
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
Name of the Vulnerable Software and Affected Versions:
netavark (affected versions not specified)
Description:
A vulnerability exists in the netavark package, a network stack for containers used with Podman. Due to the removal of the dns.podman search domain, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a container with a given name, this name is used as the hostname for the container. Because the Podman search domain is no longer added, the container uses the host's resolv.conf, and the DNS resolver searches the domains contained within it. If one of these domains contains a name matching the running container's hostname, the connection may be forwarded to unexpected external servers.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Weakness Enumeration
Related Identifiers
Affected Products
References · 13
- https://nvd.nist.gov/vuln/detail/CVE-2025-8283 · Security Note
- https://osv.dev/vulnerability/GHSA-rpcf-rmh6-42xr · Vendor Advisory
- https://github.com/containers/podman/issues/26198⭐ 28050 🔗 2727 · Note
- https://github.com/containers/netavark/commit/068abc869b736a03a947b5419c102da73830e882⭐ 621 🔗 106 · Note
- https://github.com/containers/netavark/pull/1256⭐ 621 🔗 106 · Note
- https://github.com/containers/netavark⭐ 621 🔗 106 · Note
- https://github.com/containers/netavark/releases/tag/v1.15.1⭐ 621 🔗 106 · Note
- https://t.me/CVEtracker/28611 · Telegram Post
- https://twitter.com/marcin_brz81183/status/1950132034992586887 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1949998115492143201 · Twitter Post
- https://access.redhat.com/security/cve/CVE-2025-8283 · Note
- https://bugzilla.redhat.com/show_bug.cgi?id=2383941 · Note
- https://twitter.com/CVEnew/status/1949906658982838502 · Twitter Post