Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: podman

Found 1 matching suggestions

View:
Compact
Detailed
Permalink CVE-2025-4953
7.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • podman-tui
    • podman-bootc
    • podman-compose
    • podman-desktop
    • nomad-driver-podman
    • python312Packages.podman
    • python313Packages.podman
  • @LeSuisse accepted
  • @LeSuisse removed
    2 maintainers
    • @saschagrunert
    • @vdemeester
  • @LeSuisse published on GitHub
Podman: build context bind mount

A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.

References

Affected products

runc
  • *
cri-o
  • *
rhcos
  • *
conmon
  • *
kernel
  • *
podman
  • *
  • *
skopeo
  • *
buildah
  • *
haproxy
  • *
ignition
  • *
cri-tools
  • *
kernel-rt
  • *
openshift
  • *
openshift-kuryr
  • *
openshift-ansible
  • *
openshift-clients
  • *
openshift4-aws-iso
  • *
container-tools:rhel8
  • *
containernetworking-plugins
  • *
container-tools:rhel8/podman

Matching in nixpkgs

pkgs.podman

Program for managing pods, containers and container images

  • nixos-unstable -

Package maintainers

Ignored maintainers (2)
RH/Debian discussion: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117966#22