Количество 15
Количество 15
CVE-2020-13753
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
CVE-2020-13753
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
CVE-2020-13753
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
CVE-2020-13753
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, f ...
GHSA-7vvx-4whv-jg73
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
openSUSE-SU-2020:1064-1
Security update for webkit2gtk3
SUSE-SU-2020:2069-1
Security update for webkit2gtk3
SUSE-SU-2020:1992-1
Security update for webkit2gtk3
SUSE-SU-2020:1990-1
Security update for webkit2gtk3
openSUSE-SU-2022:0182-2
Security update for webkit2gtk3
openSUSE-SU-2022:0182-1
Security update for webkit2gtk3
SUSE-SU-2022:0182-2
Security update for webkit2gtk3
SUSE-SU-2022:0182-1
Security update for webkit2gtk3
SUSE-SU-2022:0183-1
Security update for webkit2gtk3
SUSE-SU-2022:0142-1
Security update for webkit2gtk3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-13753 The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226. | CVSS3: 10 | 1% Низкий | больше 5 лет назад | |
CVE-2020-13753 The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226. | CVSS3: 10 | 1% Низкий | больше 5 лет назад | |
CVE-2020-13753 The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226. | CVSS3: 10 | 1% Низкий | больше 5 лет назад | |
CVE-2020-13753 The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, f ... | CVSS3: 10 | 1% Низкий | больше 5 лет назад | |
GHSA-7vvx-4whv-jg73 The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226. | CVSS3: 10 | 1% Низкий | больше 3 лет назад | |
openSUSE-SU-2020:1064-1 Security update for webkit2gtk3 | больше 5 лет назад | |||
SUSE-SU-2020:2069-1 Security update for webkit2gtk3 | больше 5 лет назад | |||
SUSE-SU-2020:1992-1 Security update for webkit2gtk3 | больше 5 лет назад | |||
SUSE-SU-2020:1990-1 Security update for webkit2gtk3 | больше 5 лет назад | |||
openSUSE-SU-2022:0182-2 Security update for webkit2gtk3 | почти 4 года назад | |||
openSUSE-SU-2022:0182-1 Security update for webkit2gtk3 | около 4 лет назад | |||
SUSE-SU-2022:0182-2 Security update for webkit2gtk3 | почти 4 года назад | |||
SUSE-SU-2022:0182-1 Security update for webkit2gtk3 | около 4 лет назад | |||
SUSE-SU-2022:0183-1 Security update for webkit2gtk3 | около 4 лет назад | |||
SUSE-SU-2022:0142-1 Security update for webkit2gtk3 | около 4 лет назад |
Уязвимостей на страницу