Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-40226

Опубликовано: 10 апр. 2026
Источник: debian
EPSS Низкий

Описание

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed260~rc3-1package
systemdno-dsatrixiepackage
systemdno-dsabookwormpackage

Примечания

  • https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx

  • Fixed by: https://github.com/systemd/systemd/commit/61bceb1bff4b1f9c126b18dc971ca3e6d8c71c40 (v260-rc3)

  • Fixed by: https://github.com/systemd/systemd/commit/7b85f5498a958e5bb660c703b8f4a71cceed3373 (v260-rc3)

  • Fixed by: https://github.com/systemd/systemd/commit/773fd3b6e72e6c83cbb1cfc1cb20f3793db8649a (v257.12)

  • Fixed by: https://github.com/systemd/systemd/commit/bfa0a842822c4f79da9d47f8a773fd128d8f8a0a (v257.12)

EPSS

Процентиль: 0%
0.00006
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
2 дня назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

CVSS3: 6.4
redhat
5 дней назад

A flaw was found in nspawn, a container runtime environment within systemd. A local attacker or a process within an nspawn container could exploit this vulnerability by using a specially crafted optional configuration file. This could allow the attacker to escape the container's isolation and execute arbitrary actions on the host system.

CVSS3: 6.4
nvd
5 дней назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

msrc
3 дня назад

Описание отсутствует

CVSS3: 6.4
github
5 дней назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

EPSS

Процентиль: 0%
0.00006
Низкий