Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-13753

Опубликовано: 14 июл. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 10

Описание

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

ignored

eoan

ignored

end of life
esm-apps/bionic

ignored

esm-apps/focal

ignored

esm-apps/jammy

ignored

esm-apps/noble

ignored

esm-infra-legacy/trusty

DNE

esm-infra/xenial

ignored

focal

ignored

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-apps/bionic

ignored

esm-apps/xenial

ignored

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

РелизСтатусПримечание
bionic

released

2.28.3-0ubuntu0.18.04.1
devel

not-affected

2.28.3-2
eoan

released

2.28.3-0ubuntu0.19.10.1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2.28.3-0ubuntu0.18.04.1
esm-infra/focal

released

2.28.3-0ubuntu0.20.04.1
esm-infra/xenial

ignored

focal

released

2.28.3-0ubuntu0.20.04.1
groovy

not-affected

2.28.3-2
hirsute

not-affected

2.28.3-2

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-apps/bionic

ignored

esm-apps/xenial

ignored

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

EPSS

Процентиль: 79%
0.01219
Низкий

7.5 High

CVSS2

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
redhat
больше 5 лет назад

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

CVSS3: 10
nvd
больше 5 лет назад

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

CVSS3: 10
debian
больше 5 лет назад

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, f ...

CVSS3: 10
github
больше 3 лет назад

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

suse-cvrf
больше 5 лет назад

Security update for webkit2gtk3

EPSS

Процентиль: 79%
0.01219
Низкий

7.5 High

CVSS2

10 Critical

CVSS3