CVE-2025-4953: Creation of Temporary File With Insecure Permissions in Red Hat Red Hat Enterprise Linux 10
A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.
AI Analysis
Technical Summary
CVE-2025-4953 is a high-severity vulnerability affecting Red Hat Enterprise Linux 10, specifically related to the Podman container management tool. The flaw arises during the container image build process when using the RUN --mount=type=bind option. Normally, data written to bind mounts during the build should be ephemeral and discarded after the build completes. However, due to this vulnerability, files created inside the container during the build persist in the temporary build context directory on the host system. This behavior leads to insecure temporary files being left accessible on the host filesystem. Since these files may contain sensitive data or configuration details generated during the build, their unintended exposure can compromise confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 7.4, indicating high severity, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N. This means the vulnerability is remotely exploitable over the network without authentication or user interaction, but requires high attack complexity. The impact primarily affects confidentiality and integrity, as attackers could access or manipulate sensitive build artifacts. There are no known exploits in the wild yet, and no patches or mitigations are linked in the provided data, suggesting the issue is newly disclosed. This vulnerability highlights a critical weakness in container build isolation and temporary file handling in Podman on Red Hat Enterprise Linux 10 systems.
Potential Impact
For European organizations using Red Hat Enterprise Linux 10 with Podman for containerized application development or deployment, this vulnerability poses a significant risk. Sensitive build-time data such as credentials, configuration files, or proprietary code could be exposed if temporary build files are accessible to unauthorized users on the host. This could lead to intellectual property theft, leakage of secrets, or unauthorized modification of build artifacts, undermining the integrity of container images. Organizations relying on container security for compliance (e.g., GDPR for protecting personal data) may face regulatory and reputational consequences if sensitive data is leaked. Additionally, attackers gaining access to these temporary files could leverage them for further attacks within the network. The fact that exploitation does not require authentication or user interaction increases the threat level, especially in multi-tenant or shared environments common in European cloud and enterprise data centers.
Mitigation Recommendations
1. Immediately monitor and audit temporary build context directories on hosts running Podman builds to detect unauthorized or unexpected files. 2. Restrict filesystem permissions on temporary build directories to limit access only to trusted users and processes. 3. Avoid using RUN --mount=type=bind during Podman builds until a patch or official fix is released. 4. Implement strict container build policies that isolate build environments and clean up all temporary files post-build. 5. Use alternative container build tools or versions not affected by this vulnerability if feasible. 6. Stay updated with Red Hat security advisories and apply patches promptly once available. 7. Employ host-based intrusion detection systems to alert on suspicious file creation or access patterns in build directories. 8. Consider encrypting sensitive build data or using secrets management solutions that do not rely on temporary files during builds.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2025-4953: Creation of Temporary File With Insecure Permissions in Red Hat Red Hat Enterprise Linux 10
Description
A flaw was found in Podman. In a Containerfile or Podman, data written to RUN --mount=type=bind mounts during the podman build is not discarded. This issue can lead to files created within the container appearing in the temporary build context directory on the host, leaving the created files accessible.
AI-Powered Analysis
Technical Analysis
CVE-2025-4953 is a high-severity vulnerability affecting Red Hat Enterprise Linux 10, specifically related to the Podman container management tool. The flaw arises during the container image build process when using the RUN --mount=type=bind option. Normally, data written to bind mounts during the build should be ephemeral and discarded after the build completes. However, due to this vulnerability, files created inside the container during the build persist in the temporary build context directory on the host system. This behavior leads to insecure temporary files being left accessible on the host filesystem. Since these files may contain sensitive data or configuration details generated during the build, their unintended exposure can compromise confidentiality and integrity. The vulnerability has a CVSS 3.1 base score of 7.4, indicating high severity, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N. This means the vulnerability is remotely exploitable over the network without authentication or user interaction, but requires high attack complexity. The impact primarily affects confidentiality and integrity, as attackers could access or manipulate sensitive build artifacts. There are no known exploits in the wild yet, and no patches or mitigations are linked in the provided data, suggesting the issue is newly disclosed. This vulnerability highlights a critical weakness in container build isolation and temporary file handling in Podman on Red Hat Enterprise Linux 10 systems.
Potential Impact
For European organizations using Red Hat Enterprise Linux 10 with Podman for containerized application development or deployment, this vulnerability poses a significant risk. Sensitive build-time data such as credentials, configuration files, or proprietary code could be exposed if temporary build files are accessible to unauthorized users on the host. This could lead to intellectual property theft, leakage of secrets, or unauthorized modification of build artifacts, undermining the integrity of container images. Organizations relying on container security for compliance (e.g., GDPR for protecting personal data) may face regulatory and reputational consequences if sensitive data is leaked. Additionally, attackers gaining access to these temporary files could leverage them for further attacks within the network. The fact that exploitation does not require authentication or user interaction increases the threat level, especially in multi-tenant or shared environments common in European cloud and enterprise data centers.
Mitigation Recommendations
1. Immediately monitor and audit temporary build context directories on hosts running Podman builds to detect unauthorized or unexpected files. 2. Restrict filesystem permissions on temporary build directories to limit access only to trusted users and processes. 3. Avoid using RUN --mount=type=bind during Podman builds until a patch or official fix is released. 4. Implement strict container build policies that isolate build environments and clean up all temporary files post-build. 5. Use alternative container build tools or versions not affected by this vulnerability if feasible. 6. Stay updated with Red Hat security advisories and apply patches promptly once available. 7. Employ host-based intrusion detection systems to alert on suspicious file creation or access patterns in build directories. 8. Consider encrypting sensitive build data or using secrets management solutions that do not rely on temporary files during builds.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-19T11:55:32.522Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c97badd327290d6e7319d0
Added to database: 9/16/2025, 3:01:01 PM
Last enriched: 9/16/2025, 3:03:57 PM
Last updated: 9/19/2025, 1:25:51 AM
Views: 17
Related Threats
CVE-2025-10719: CWE-639 Authorization Bypass Through User-Controlled Key in WisdomGarden Tronclass
MediumCVE-2025-8531: CWE-130 Improper Handling of Length Parameter Inconsistency in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU
MediumCVE-2025-9906: CWE-502 Deserialization of Untrusted Data in Keras-team Keras
HighCVE-2025-9905: CWE-913 Improper Control of Dynamically-Managed Code Resources in Keras-team Keras
HighCVE-2025-7403: Write-what-where Condition in zephyrproject-rtos Zephyr
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.