{"id":"CVE-2012-0871","details":"The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.","modified":"2026-04-10T03:42:12.798157Z","published":"2014-04-18T14:55:25Z","references":[{"type":"REPORT","url":"https://bugzilla.novell.com/show_bug.cgi?id=747154"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=795853"},{"type":"WEB","url":"http://cgit.freedesktop.org/systemd/systemd/commit/?id=fc3c1c6e091ea16ad5600b145201ec535bbb5d7c"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00030.html"},{"type":"WEB","url":"http://www.osvdb.org/79768"}],"schema_version":"1.7.5"}