spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Spice-gtk | Spice-gtk_project | 0.14 (including) | 0.14 (including) |
| Red Hat Enterprise Linux 6 | RedHat | spice-gtk-0:0.14-7.el6_4.3 | * |
| Spice-gtk | Ubuntu | precise | * |
| Spice-gtk | Ubuntu | quantal | * |
| Spice-gtk | Ubuntu | raring | * |
| Spice-gtk | Ubuntu | saucy | * |