CVE-2012-4425
18.09.2012, 17:55
libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.Enginsight
| Vendor | Product | Version |
|---|---|---|
| freedesktop | spice-gtk | - |
| gtk | libgio | - |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| glib2.0 |
| ||||||||||||||||||||||||||||||||||||||||||||||
| spice-gtk |
|
Common Weakness Enumeration
References