The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
Loading...
Loading...
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
April 18, 2014
May 6, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2012-0871
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.