Описание
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
Ссылки
- ExploitPatch
- ExploitPatch
- ExploitPatch
- Vendor Advisory
- Vendor Advisory
- ExploitPatch
- ExploitPatch
- ExploitPatch
Уязвимые конфигурации
Одно из
EPSS
1.9 Low
CVSS2
Дефекты
Связанные уязвимости
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
The user_change_icon_file_authorized_cb function in /usr/libexec/accou ...
The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
EPSS
1.9 Low
CVSS2