vulnerability
Arch Linux: Arbitrary file overwrite (CVE-2018-6954)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Feb 13, 2018 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Feb 13, 2018
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
Solution
arch-linux-upgrade-latest
References
- CVE-2018-6954
- https://attackerkb.com/topics/CVE-2018-6954
- URL-http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- URL-https://github.com/systemd/systemd/issues/7986
- URL-https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- URL-https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- URL-https://security.archlinux.org/ASA-201901-4
- URL-https://usn.ubuntu.com/3816-1/
- URL-https://usn.ubuntu.com/3816-2/
- CWE-59
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.