๐Ÿ” CVE Alert

CVE-2025-8283

LOW 3.7

Netavark: podman: netavark may resolve hostnames to unexpected hosts

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in the netavark package, a network stack for containers used with Podman. Due to dns.podman search domain being removed, netavark may return external servers if a valid A/AAAA record is sent as a response. When creating a container with a given name, this name will be used as the hostname for the container itself, as the podman's search domain is not added anymore the container is using the host's resolv.conf, and the DNS resolver will try to look into the search domains contained on it. If one of the domains contain a name with the same hostname as the running container, the connection will forward to unexpected external servers.

CWE CWE-15
Published Jul 28, 2025
Last Updated Nov 7, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new low vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-8283 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2383941 github.com: https://github.com/advisories/GHSA-rpcf-rmh6-42xr github.com: https://github.com/containers/netavark/releases/tag/v1.15.1

Credits

Red Hat would like to thank Johannes Kasberger for reporting this issue.