Описание
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| systemd | fixed | 260~rc3-1 | package | |
| systemd | no-dsa | trixie | package | |
| systemd | no-dsa | bookworm | package |
Примечания
https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx
Fixed by: https://github.com/systemd/systemd/commit/61bceb1bff4b1f9c126b18dc971ca3e6d8c71c40 (v260-rc3)
Fixed by: https://github.com/systemd/systemd/commit/7b85f5498a958e5bb660c703b8f4a71cceed3373 (v260-rc3)
Fixed by: https://github.com/systemd/systemd/commit/773fd3b6e72e6c83cbb1cfc1cb20f3793db8649a (v257.12)
Fixed by: https://github.com/systemd/systemd/commit/bfa0a842822c4f79da9d47f8a773fd128d8f8a0a (v257.12)
EPSS
Связанные уязвимости
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
A flaw was found in nspawn, a container runtime environment within systemd. A local attacker or a process within an nspawn container could exploit this vulnerability by using a specially crafted optional configuration file. This could allow the attacker to escape the container's isolation and execute arbitrary actions on the host system.
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
EPSS