DEBIAN-CVE-2020-13753

Advisory lineage Upstream: 1 Downstream: 1
Upstream
Downstream
Published: 14 Jul 2020, 14:15
Last modified:19 Nov 2025, 01:04

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
10 CRITICAL
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

14 Jul 2020, 14:15
Published
Vulnerability first disclosed
19 Nov 2025, 01:04
Last Modified
Vulnerability information updated

Description

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

CVSS Metrics

  • v3.1CRITICALScore: 10CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Affected Systems

  • debianwebkit2gtk

    < 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1

  • debianwpewebkit

    < 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1

References (1)