CVE-2012-2737
22.07.2012, 17:55
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
Vendor | Product | Version |
---|---|---|
ray_stode | accountsservice | 𝑥 ≤ 0.6.21 |
ray_stode | accountsservice | 0.4 |
ray_stode | accountsservice | 0.5 |
ray_stode | accountsservice | 0.6 |
ray_stode | accountsservice | 0.6.1 |
ray_stode | accountsservice | 0.6.2 |
ray_stode | accountsservice | 0.6.3 |
ray_stode | accountsservice | 0.6.4 |
ray_stode | accountsservice | 0.6.5 |
ray_stode | accountsservice | 0.6.6 |
ray_stode | accountsservice | 0.6.7 |
ray_stode | accountsservice | 0.6.8 |
ray_stode | accountsservice | 0.6.9 |
ray_stode | accountsservice | 0.6.10 |
ray_stode | accountsservice | 0.6.11 |
ray_stode | accountsservice | 0.6.12 |
ray_stode | accountsservice | 0.6.13 |
ray_stode | accountsservice | 0.6.14 |
ray_stode | accountsservice | 0.6.15 |
ray_stode | accountsservice | 0.6.16 |
ray_stode | accountsservice | 0.6.17 |
ray_stode | accountsservice | 0.6.18 |
ray_stode | accountsservice | 0.6.19 |
ray_stode | accountsservice | 0.6.20 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References