The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html - | |
References | () http://www.osvdb.org/79768 - | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=747154 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=795853 - |
Information
Published : 2014-04-18 14:55
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0871
Mitre link : CVE-2012-0871
CVE.ORG link : CVE-2012-0871
JSON object : View
Products Affected
opensuse
- opensuse
systemd_project
- systemd
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')