CVE-2012-2737 - Gaumless Rewards
Description
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory which allows local users to read arbitrary files via a race condition.
Reference
http://secunia.com/advisories/49695 http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69 http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5 http://www.openwall.com/lists/oss-security/2012/06/28/9 http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d http://osvdb.org/83398 http://www.ubuntu.com/usn/USN-1485-1 http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html https://bugzilla.redhat.com/show_bug.cgi?id=832532 http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721 http://www.securityfocus.com/bid/54223 http://secunia.com/advisories/49759 https://hermes.opensuse.org/messages/15100967 https://exchange.xforce.ibmcloud.com/vulnerabilities/76648