Описание
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 0.22-0nocent2 |
esm-apps/xenial | not-affected | 0.22-0nocent2 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [0.22-0nocent2]] |
lucid | DNE | |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
quantal | ignored | end of life |
raring | ignored | end of life |
saucy | ignored | end of life |
trusty | not-affected | 0.22-0nocent2 |
Показывать по
Ссылки на источники
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
spice-gtk 0.14, and possibly other versions, invokes the polkit author ...
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
EPSS
4.6 Medium
CVSS2