Описание
libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 2.34.1-1 |
| bionic | not-affected | 2.34.1-1 |
| cosmic | not-affected | 2.34.1-1 |
| devel | not-affected | 2.34.1-1 |
| disco | not-affected | 2.34.1-1 |
| eoan | not-affected | 2.34.1-1 |
| esm-infra-legacy/trusty | not-affected | 2.34.1-1 |
| esm-infra/bionic | not-affected | 2.34.1-1 |
| esm-infra/focal | not-affected | 2.34.1-1 |
| esm-infra/xenial | not-affected | 2.34.1-1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 0.14-1 |
| bionic | not-affected | 0.14-1 |
| cosmic | not-affected | 0.14-1 |
| devel | not-affected | 0.14-1 |
| disco | not-affected | 0.14-1 |
| eoan | not-affected | 0.14-1 |
| esm-apps/bionic | not-affected | 0.14-1 |
| esm-apps/focal | not-affected | 0.14-1 |
| esm-apps/xenial | not-affected | 0.14-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [0.14-1]] |
Показывать по
6.9 Medium
CVSS2
Связанные уязвимости
libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
libgio, when used in setuid or other privileged programs in spice-gtk ...
libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
6.9 Medium
CVSS2