The user_change_icon_file_authorized_cb function in /usr...
Low severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Jul 22, 2012
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Feb 3, 2023
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
References