DEBIAN-CVE-2020-13753
Advisory lineage Upstream: 1 Downstream: 1
Upstream
Downstream
Published: 14 Jul 2020, 14:15
Last modified:19 Nov 2025, 01:04
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
10 CRITICAL
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
14 Jul 2020, 14:15
Published
Vulnerability first disclosed
19 Nov 2025, 01:04
Last Modified
Vulnerability information updated
Description
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
CVSS Metrics
- v3.1•CRITICAL•Score: 10CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Affected Systems
- debian•webkit2gtk
< 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1
- debian•wpewebkit
< 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1 | < 2.28.3-1