Link Following Affecting systemd package, versions <43-1
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-SYSTEMD-523807
- published 18 Apr 2014
- disclosed 18 Apr 2014
Introduced: 18 Apr 2014
CVE-2012-0871 Open this link in a new tabHow to fix?
Upgrade Debian:11
systemd
to version 43-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream systemd
package and not the systemd
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.
References
- https://security-tracker.debian.org/tracker/CVE-2012-0871
- http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c
- https://bugzilla.novell.com/show_bug.cgi?id=747154
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html
- https://bugzilla.redhat.com/show_bug.cgi?id=795853
- http://www.osvdb.org/79768
CVSS Scores
version 3.1