[ASA-202110-10] wpewebkit: multiple issues

Jonas Witschel diabonas at archlinux.org
Mon Nov 1 11:38:12 UTC 2021


Arch Linux Security Advisory ASA-202110-10
==========================================

Severity: Medium
Date    : 2021-10-29
CVE-ID  : CVE-2021-30846 CVE-2021-30851 CVE-2021-42762
Package : wpewebkit
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2484

Summary
=======

The package wpewebkit before version 2.34.1-1 is vulnerable to multiple
issues including arbitrary code execution and sandbox escape.

Resolution
==========

Upgrade to 2.34.1-1.

# pacman -Syu "wpewebkit>=2.34.1-1"

The problems have been fixed upstream in version 2.34.1.

Workaround
==========

None.

Description
===========

- CVE-2021-30846 (arbitrary code execution)

A security issue has been found in WebKitGTK and WPE WebKit before
2.34.0. Processing maliciously crafted web content may lead to
arbitrary code execution.

- CVE-2021-30851 (arbitrary code execution)

A security issue has been found in WebKitGTK and WPE WebKit before
2.34.0. Processing maliciously crafted web content may lead to
arbitrary code execution.

- CVE-2021-42762 (sandbox escape)

BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows
a limited sandbox bypass that allows a sandboxed process to trick host
processes into thinking the sandboxed process is not confined by the
sandbox, by abusing VFS syscalls that manipulate its filesystem
namespace. The impact is limited to host services that create UNIX
sockets that WebKit mounts inside its sandbox, and the sandboxed
process remains otherwise confined. NOTE: this is similar to
CVE-2021-41133.

Impact
======

A remote attacker could execute arbitrary code or escape the
confinements of the security sandbox through crafted web content.

References
==========

https://webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-30846
https://webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-30851
https://webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-42762
https://bugs.webkit.org/show_bug.cgi?id=231479
https://trac.webkit.org/changeset/284451/webkit
https://security.archlinux.org/CVE-2021-30846
https://security.archlinux.org/CVE-2021-30851
https://security.archlinux.org/CVE-2021-42762
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20211101/7478e111/attachment.sig>


More information about the arch-security mailing list