Description
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4724-1 | webkit2gtk security update |
EUVD |
EUVD-2020-5974 | The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226. |
Ubuntu USN |
USN-4422-1 | WebKitGTK+ vulnerabilities |
Ubuntu USN |
USN-4648-1 | WebKitGTK vulnerabilities |
References
History
Mon, 07 Jul 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat rhel Els |
|
| CPEs | cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products |
Redhat
Redhat rhel Els |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:25:16.519Z
Reserved: 2020-06-01T00:00:00.000Z
Link: CVE-2020-13753
No data.
Status : Modified
Published: 2020-07-14T14:15:17.603
Modified: 2024-11-21T05:01:46.903
Link: CVE-2020-13753
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN