First published: Wed Oct 20 2021(Updated: )
BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 | |
WebKitGTK WebKitGTK | <2.34.1 | |
Wpewebkit Wpe Webkit | <2.34.1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
<2.34.1 | ||
<2.34.1 | ||
=33 | ||
=34 | ||
=35 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-42762.
The severity of CVE-2021-42762 is medium with a severity value of 5.3.
The software affected by CVE-2021-42762 includes WebKitGTK version up to 2.34.1, WPE WebKit version up to 2.34.1, webkit2gtk package on Debian, and wpewebkit package on Debian.
The vulnerability can be exploited by a sandboxed process tricking host processes into thinking it is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace.
To fix CVE-2021-42762, it is recommended to update to the patched versions of WebKitGTK (2.36.4-1~deb10u1 and later) and WPE WebKit (2.38.6-1~deb11u1 and later), or the latest available versions.