The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://trac.webkit.org/changeset/262368/webkit | patch vendor advisory |
https://www.openwall.com/lists/oss-security/2020/07/10/1 | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4724 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/ | vendor advisory |
https://usn.ubuntu.com/4422-1/ | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/202007-11 | third party advisory vendor advisory |