CVE-2012-0871
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0012 (0.1%)
Percentile: 30.8%
EPSS: 2026-05-06
Affects
systemd_project:systemdopensuse:opensuseTechnical description
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
Published: 4/18/2014, 2:55:25 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html
- http://www.osvdb.org/79768
- https://bugzilla.novell.com/show_bug.cgi?id=747154
- https://bugzilla.redhat.com/show_bug.cgi?id=795853
- http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html
- http://www.osvdb.org/79768