[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-42762Date: (C)2021-10-22   (M)2024-05-24


BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.3CVSS Score : 4.6
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 3.4Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: PARTIAL
Integrity: LOW 
Availability: LOW 
  
Reference:
DSA-4995
DSA-4996
FEDORA-2021-131360fa9a
FEDORA-2021-483d896d1d
FEDORA-2021-db6ebb2d68
http://www.openwall.com/lists/oss-security/2021/10/26/9
http://www.openwall.com/lists/oss-security/2021/10/27/4
https://bugs.webkit.org/show_bug.cgi?id=231479
https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q

CPE    1
cpe:/a:webkitgtk:webkitgtk
OVAL    13
oval:org.secpod.oval:def:1701375
oval:org.secpod.oval:def:2107144
oval:org.secpod.oval:def:706202
oval:org.secpod.oval:def:120939
...

© SecPod Technologies