漏洞信息详情
WebKitGTK和WPE WebKit 输入验证错误漏洞
漏洞简介
WebKitGTK是KDE、苹果(Apple)、谷歌(Google)等公司共同开发的一套开源的Web浏览器引擎。
WebKitGTK 2.28.3之前版本和WPE WebKit 2.28.3之前版本中的bubblewrap沙箱存在安全漏洞,该漏洞源于程序没有正确阻止对CLONE_NEWUSER和TIOCSTI ioctl的访问。攻击者可利用该漏洞在沙箱外部执行命令。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://trac.webkit.org/changeset/262368/webkit
参考网址
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4724
来源:MISC
链接:https://trac.webkit.org/changeset/262368/webkit
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/
来源:GENTOO
链接:https://security.gentoo.org/glsa/202007-11
来源:CONFIRM
链接:https://www.openwall.com/lists/oss-security/2020/07/10/1
来源:UBUNTU
链接:https://usn.ubuntu.com/4422-1/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2403/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2610/
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48514
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-13753
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2419/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4205/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160244/Ubuntu-Security-Notice-USN-4648-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158572/Gentoo-Linux-Security-Advisory-202007-11.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2509/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158425/Ubuntu-Security-Notice-USN-4422-1.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/WebKitGTK-multiple-vulnerabilities-32802
受影响实体
暂无
补丁
- WebKitGTK和WPE WebKit 输入验证错误漏洞的修复措施<!--2020-7-14-->
还没有评论,来说两句吧...