Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-40226

Опубликовано: 10 апр. 2026
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

A flaw was found in nspawn, a container runtime environment within systemd. A local attacker or a process within an nspawn container could exploit this vulnerability by using a specially crafted optional configuration file. This could allow the attacker to escape the container's isolation and execute arbitrary actions on the host system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10NetworkManagerNot affected
Red Hat Enterprise Linux 10rpm-ostreeNot affected
Red Hat Enterprise Linux 10systemdNot affected
Red Hat Enterprise Linux 7systemdNot affected
Red Hat Enterprise Linux 8NetworkManagerNot affected
Red Hat Enterprise Linux 8systemdNot affected
Red Hat Enterprise Linux 9NetworkManagerNot affected
Red Hat Enterprise Linux 9systemdNot affected
Red Hat Hardened ImagessystemdNot affected
Red Hat OpenShift Container Platform 4NetworkManagerNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-348
https://bugzilla.redhat.com/show_bug.cgi?id=2457326systemd: systemd nspawn: Escape-to-host action via crafted config file

EPSS

Процентиль: 0%
0.00006
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
2 дня назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

CVSS3: 6.4
nvd
5 дней назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

msrc
3 дня назад

Описание отсутствует

CVSS3: 6.4
debian
5 дней назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host act ...

CVSS3: 6.4
github
5 дней назад

In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.

EPSS

Процентиль: 0%
0.00006
Низкий

6.4 Medium

CVSS3