BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-4995-1 | webkit2gtk security update |
![]() |
DSA-4996-1 | wpewebkit security update |
![]() |
EUVD-2021-29720 | BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133. |
![]() |
USN-5127-1 | WebKitGTK vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 07 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhel Els |
|
CPEs | cpe:/o:redhat:rhel_els:7 | |
Vendors & Products |
Redhat
Redhat rhel Els |

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:38:50.056Z
Reserved: 2021-10-20T00:00:00
Link: CVE-2021-42762

No data.

Status : Modified
Published: 2021-10-20T19:15:07.637
Modified: 2024-11-21T06:28:07.307
Link: CVE-2021-42762


No data.