{"id":"CVE-2012-2737","details":"The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.","modified":"2026-04-10T03:43:10.604776Z","published":"2012-07-22T17:55:02Z","related":["openSUSE-SU-2024:10244-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/49695"},{"type":"ADVISORY","url":"http://secunia.com/advisories/49759"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1485-1"},{"type":"EVIDENCE","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5"},{"type":"EVIDENCE","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d"},{"type":"EVIDENCE","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721"},{"type":"FIX","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=26213aa0e0d8dca5f36cc23f6942525224cbe9f5"},{"type":"FIX","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=4c5b12e363410e490e776e4b4a86dcce157a543d"},{"type":"FIX","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=bd51aa4cdac380f55d607f4ffdf2ab3c00d08721"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=832532"},{"type":"WEB","url":"http://cgit.freedesktop.org/accountsservice/commit/?id=27f3d93a82fde4f6c7ab54f3f008af04f93f9c69"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083359.html"},{"type":"WEB","url":"http://osvdb.org/83398"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/06/28/9"},{"type":"WEB","url":"http://www.securityfocus.com/bid/54223"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/76648"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/15100967"}],"schema_version":"1.7.5"}