Command-injection vulnerability in ABRT’s container data handling. The flaw is caused by ABRT extracting a 12-byte substring from user-controlled mount information and embedding it verbatim into a shell command constructed with g_strdup_printf("docker inspect %s", container_id). Because the input is not sanitized and is passed to a shell invocation, a crafted mountinfo value can inject shell metacharacters and arbitrary commands. This can be exploited locally by any user with access to ABRT’s UNIX socket to escalate to root and escape systemd sandboxing, enabling full system compromise.