Podman Creates Temporary File with Insecure Permissions
High severity
GitHub Reviewed
Published
Sep 16, 2025
to the GitHub Advisory Database
•
Updated Sep 16, 2025
Description
Published by the National Vulnerability Database
Sep 16, 2025
Published to the GitHub Advisory Database
Sep 16, 2025
Reviewed
Sep 16, 2025
Last updated
Sep 16, 2025
A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.
References