libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Spice-gtk | Freedesktop | - (including) | - (including) |
Libgio | Gtk | - (including) | - (including) |
Red Hat Enterprise Linux 6 | RedHat | spice-gtk-0:0.11-11.el6_3.1 | * |
Glib2.0 | Ubuntu | hardy | * |
Glib2.0 | Ubuntu | lucid | * |
Glib2.0 | Ubuntu | natty | * |
Glib2.0 | Ubuntu | oneiric | * |
Glib2.0 | Ubuntu | precise | * |
Glib2.0 | Ubuntu | precise/esm | * |
Glib2.0 | Ubuntu | upstream | * |
Spice-gtk | Ubuntu | quantal | * |