漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Sandbox escape vulnerability via snapctl user-open (xdg-open)
漏洞信息
It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.
漏洞信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
漏洞
N/A
漏洞
Canonical snapd 安全漏洞
漏洞信息
Canonical snapd是英国科能(Canonical)公司的一套软件部署和包管理系统。 Canonical snapd中存在安全漏洞,该漏洞源于snapctl user-open允许在调用系统xdg-open时更改$XDG_DATA_DIRS环境变量。攻击者可利用该漏洞绕过访问限制,以控制主机系统xdg-open脚本打开URL的方式。
漏洞信息
N/A
漏洞
N/A