CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
75.8%
Severity: Medium
Date : 2021-10-29
CVE-ID : CVE-2021-30846 CVE-2021-30851 CVE-2021-42762
Package : wpewebkit
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-2484
The package wpewebkit before version 2.34.1-1 is vulnerable to multiple
issues including arbitrary code execution and sandbox escape.
Upgrade to 2.34.1-1.
The problems have been fixed upstream in version 2.34.1.
None.
A security issue has been found in WebKitGTK and WPE WebKit before
2.34.0. Processing maliciously crafted web content may lead to
arbitrary code execution.
A security issue has been found in WebKitGTK and WPE WebKit before
2.34.0. Processing maliciously crafted web content may lead to
arbitrary code execution.
BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows
a limited sandbox bypass that allows a sandboxed process to trick host
processes into thinking the sandboxed process is not confined by the
sandbox, by abusing VFS syscalls that manipulate its filesystem
namespace. The impact is limited to host services that create UNIX
sockets that WebKit mounts inside its sandbox, and the sandboxed
process remains otherwise confined. NOTE: this is similar to
CVE-2021-41133.
A remote attacker could execute arbitrary code or escape the
confinements of the security sandbox through crafted web content.
https://webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-30846
https://webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-30851
https://webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-42762
https://bugs.webkit.org/show_bug.cgi?id=231479
https://trac.webkit.org/changeset/284451/webkit
https://security.archlinux.org/CVE-2021-30846
https://security.archlinux.org/CVE-2021-30851
https://security.archlinux.org/CVE-2021-42762
bugs.webkit.org/show_bug.cgi?id=231479
security.archlinux.org/AVG-2484
security.archlinux.org/CVE-2021-30846
security.archlinux.org/CVE-2021-30851
security.archlinux.org/CVE-2021-42762
trac.webkit.org/changeset/284451/webkit
webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-30846
webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-30851
webkitgtk.org/security/WSA-2021-0006.html#CVE-2021-42762
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
75.8%