CVE-2019-10214

Source
https://cve.org/CVERecord?id=CVE-2019-10214
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10214.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-10214
Aliases
Downstream
Related
Published
2019-11-25T11:15:11.120Z
Modified
2026-02-06T04:09:25.895439Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.

References

Affected packages

Git / github.com/containers/libpod

Affected ranges

Type
GIT
Repo
https://github.com/containers/libpod
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*
v0.10.1
v0.10.1.1
v0.10.1.2
v0.10.1.3
v0.11.1
v0.11.1.1
v0.12.1
v0.12.1.1
v0.12.1.2
v0.2
v0.2.1
v0.2.2
v0.3.1
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.4.1
v0.4.2
v0.4.3
v0.4.4
v0.5.1
v0.5.2
v0.5.3
v0.5.4
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.8.1
v0.8.2
v0.8.2.1
v0.8.3
v0.8.4
v0.8.5
v0.9.1
v0.9.1.1
v0.9.2
v0.9.2.1
v0.9.3
v0.9.3.1
v1.*
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.3.1
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.5.0
v1.5.1
v1.6.0
v1.6.0-rc1
v1.6.0-rc2
v1.6.1
v1.6.1-rc1
v1.6.2
v1.6.2-rc1
v1.7.0
v1.7.0-rc1
v1.7.0-rc2
v1.8.0
v1.8.0-rc1
v1.8.1
v1.8.1-rc1
v1.8.1-rc2
v1.8.1-rc3
v1.8.1-rc4
v1.8.2
v1.8.2-rc1
v1.9.0
v1.9.0-rc1
v1.9.0-rc2
v2.*
v2.0.0-rc1
v2.0.0-rc2
v2.0.0-rc3
v2.0.0-rc4
v2.0.0-rc5
v2.0.0-rc6
v2.0.0-rc7
v2.1.0
v2.1.0-rc1
v2.1.0-rc2
v2.2.0-rc1
v2.2.0-rc2
v3.*
v3.1.0-rc1
v3.2.0-rc1
v4.*
v4.0.0-rc1
v4.0.0-rc2
v4.1.0
v4.1.0-rc1
v4.1.0-rc2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10214.json"