Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-4953

Опубликовано: 16 сент. 2025
Источник: redhat
CVSS3: 7.4

Описание

A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.

Отчет

This issue is classified as Moderate rather than Important because exploitation requires several preconditions: an attacker must have unprivileged access to the host during the build process, the container build must include long-running steps (e.g., RUN sleep) that prolong the existence of the temporary build context, and files must be created with overly permissive permissions (e.g., 4777). The vulnerability does not allow remote code execution or compromise of running containers, and it only exposes files temporarily present in the build context. Therefore, while it can lead to information disclosure, the scope and impact are limited to local users with concurrent access, making the overall risk moderate.

Меры по смягчению последствий

Avoid long-running build steps and overly permissive file permissions. Use RUN --mount=type=secret for sensitive data instead of bind mounts.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10podmanAffected
Red Hat Enterprise Linux 8container-tools:rhel8/podmanAffected
Red Hat Enterprise Linux 9podmanAffected
Red Hat OpenShift Container Platform 4podmanAffected
Red Hat OpenShift Container Platform 4rhcosAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-378

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
3 месяца назад

A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.

CVSS3: 7.4
nvd
3 месяца назад

A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.

msrc
17 дней назад

Podman: build context bind mount

CVSS3: 7.4
debian
3 месяца назад

A flaw was found in Podman. In a Containerfile or Podman, data written ...

CVSS3: 7.4
github
3 месяца назад

Podman Creates Temporary File with Insecure Permissions

7.4 High

CVSS3